An all-in-one storage protection product to protect corporate and user data without disrupting existing user workflow and process. Provides hardware and operating system independence, as all industrial storage communications protocols are supported. Provides filesystem independence because it operates on the network layer abstracting filesystem underneath. Intelligent cryptographic engine senses network traffic for storage data and carries out cryptographic operations based on user-predefined rules. Works in physical and virtual environments.