Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC



Similar documents
S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

Protecting Your Data On The Network, Cloud And Virtual Servers

Mobile App User's Guide

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Secure any data, anywhere. The Vera security architecture

Business and enterprise cloud sync, backup and sharing solutions

Protecting Data with a Unified Platform

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Security Architecture Whitepaper

EasiShare Whitepaper - Empowering Your Mobile Workforce

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Vs Encryption Suites

Security Guide. BES12 Cloud

Encryption Buyers Guide

YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Manual for Android 1.5

activecho Frequently Asked Questions

Why Endpoint Encryption Can Fail to Deliver

Managing BitLocker With SafeGuard Enterprise

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper

Personal Cloud. Support Guide for Mobile Apple Devices

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

PrinterOn Print Management Overview

Data Storage that Looks at Business the Way You Do. Up. cloud

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

Save and Share Files in the Cloud with OneDrive for Business

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

Cloud Computing Security Considerations

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Egress Switch Best Practice Security Guide V4.x

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

BES12 Cloud Migration Program Description ( BES12 Cloud Migration Program Description )

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

Active Directory was compromised, now what?

An Oracle White Paper June Security and the Oracle Database Cloud Service

PrinterOn Mobile Applications for ios and Android

activecho Driving Secure Enterprise File Sharing and Syncing

Cloud Computing for Education Workshop

WatchDox for Windows. User Guide. Version 3.9.5

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

User Manual for Version Mobile Device Management (MDM) User Manual

Samsung SED Security in Collaboration with Wave Systems

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

Top. Reasons Legal Firms Select kiteworks by Accellion

Mac OS X User Manual Version 2.0

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

CTERA Portal Datacenter Edition

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

WatchDox Administrator's Guide. Application Version 3.7.5

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Parallels Desktop support Backup list icons...

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

December P Xerox App Studio 3.0 Information Assurance Disclosure

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Cloud Backup and Recovery for Endpoint Devices

ios Enterprise Deployment Overview

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2

SureDrop Secure collaboration. Without compromise.

Securing Corporate on Personal Mobile Devices

Store & Share Quick Start

Understanding Enterprise Cloud Governance

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Welcome to ncrypted Cloud!

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Moving to the Cloud: What Every CIO Should Know

Cloudifile: Frequently Asked Questions

Trusted privacy protection. Unlimited le sharing. A COREL COMPANY. Product Guide

RightsWATCH. Data-centric Security.

Mobile App User's Guide

Using Entrust certificates with VPN

Backing up your digital image collection provides it with essential protection.

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Security & Cloud Services IAN KAYNE

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

Netop Remote Control Security Server

BlackBerry Web Desktop Manager. User Guide

Dell Client Profile Updating Utility 5.5.6

What We Do: Simplify Enterprise Mobility

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

Storage Made Easy. Cloud File Server Overview

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

Cloud Identity Management Tool Quick Start Guide

4.0. Offline Folder Wizard. User Guide

Egnyte Cloud File Server. White Paper

Make life simple and make more money the easy way.

Transcription:

C NNECTED Circles of Trust Secure Cross Border File Protection & Sharing for Enterprise Product Brief www.cryptomill.com

product overview OVERVIEW Connected Circles of Trust is an endpoint data security solution for devices running on Microsoft Windows 7, 8, and 8.1 operating systems, as well as ios and Android platforms. It is intended for everyone to use- corporations, enterprises, small to medium businesses, and even personal use. A simple yet powerful data security software that encrypts files at rest and in motion; to allow for the sharing of sensitive files. Whether they are Microsoft Office files or multimedia files, they can be protected. Only members that are added to a Circle can view and edit the protected documents. The mobile versions and background sync allow for ease of access to information instantly. Connected Circles of Trust ensures that the data is protected wherever it is; either locally or in the cloud. Simple Workflow 1. Create a Circle 2. Add members and folders 3. Share files through any means Only members can access protected data Key features Prevents accidental data breaches Protects data in the event of loss or theft Seamless and transparent protection Secure and easy group sharing Online administration for ease of management across company systems Security Highlights File level security Stays secure even in cloud storage Strong encryption using government-standard AES cipher Benefits On the fly encryption Secure group sharing Data protection everywhere Seamless and transparent No interruption to workflow No additional passwords client A client B client C can have a circle for each client.

technology Connected Circles of Trust utilises CryptoMill s unique technologies to ensure the highest standard of data security. zero overhead key management Key storage is eliminated and instead each key is recomputed as needed based on environmental components. This means: No need to provide or manage key servers No key database to secure A built-in secure erase feature exists Benefits Mobility friendly - fully functional when disconnected from the office Scalable - secures any number of media and files on multiple devices Reliable - always recover access to encrypted items trust boundaries A cryptographically-enforced organizational perimeter limiting which PCs, mobile devices and storage can share protected data. Benefits Data Protection - Privacy is always preserved by encryption Prevents Internal Breaches - data can t be decrypted outside of a Trust Boundary Easy Group Sharing - automatic access to data within a Trust Boundary TECHNOLOGY persistent data protection Connected Circles of Trust files remain encrypted regardless of where they are stored. As a result, a user can safely store and view data at any time. Benefits File Level Security - Connected Circles of Trust encrypts each individual file Security Everywhere - Remains encrypted on a computer, in the cloud or on mobile. Seamless and Transparent - Allows user to access files on their default program.

features central management Connected Circles of Trust gives administrative powers to the company s core, allowing for easy management of employees access levels on an online server. Furthermore, each user has the ability to efficiently carry out commands within their created circles such as: protected cloud storage A file protected by a Circle can be sent through cloud storage providers without losing its encryption, and it will still be accessible only to the designated members of the Circle. Connected Circles of Trust supports the following cloud storage providers: FEATURES Instant Invitations: New Circle members can be invited almost immediately Recovery: Circle data can be retrieved from any member Revocation: Excluding a member is easy Logging & Reporting: Audit trail for sensitive operations (Administration only) on premises key control Cryptographic keys are kept on the customer systems only- not in the Connected Circles of Trust Cloud Management. Topology and metadata are stored in the cloud, thus ensuring only the user s organization has access to the keys and data. DropBox Google Drive Apple icloud multiple device sync All user s devices can be synced to the same account, allowing for access to all of their Circles. As a result changes can be made on any one device resulting in an instant update to all members via device sync. mobile device readers Connected Circles of Trust is supported on Apple products using ios 7 & 8, Android devices, and Windows phones. This allows the user to have on-the-go secure access to all their protected data along with management abilities.

logging and reporting Connected Circles of Trust logs detailed events within the organization providing audit trials on user activities relating to Circles. recovery With On-premise Key Management Server deployed in the enterprise, recovery of data is always within the hands of the organization only. Data is always accessible by the organization from where it originates. revocation A user can be revoked from a Circle by the administrator or the owner of the Circle. Once revoked the user will no longer be able to access the protected data. on-premise key management server The On-premise KMS is an ideal way to boost productivity with Circles of Trust while still keeping a tab on security. A On-premise KMS deployed in your organization would help with instant onboarding of new Circle of Trust members and instant provisioning of new devices for existing members. It is your own private enterprise-wide data security agent, working hard in your server room to provide secure cryptographic key exchange to people that are granted membership into the Circles. It is designed with a fail-safe switch which automatically reverts all persisted data to secure format the moment it loses power. And since all your secrets stay safely under your control, you are guaranteed that security will not be compromised through any cloud-targeted attacks. benefits Supports hybrid model where no keys are stored in the cloud. Makes the key material available for synchronization between users devices. Instant on boarding for invited users even when Circle owner devices are offline. Enables enterprise wide recovery. FEATURES This enables system-wide backup capabilities to be safely applied and makes theft of data through physical attack virtually imposable.

hybrid model CryptoMill Cloud Server No Keys Stored In Cloud HYBRID MODEL On-premise Key Managment Server Users & Devices Web Based Managment Console benefits No keys are stored in the CryptoMill cloud server. On-premise KMS provides instant on boarding and recovery. Web based management console supports multiple administrators within the organization. Supports multiple user device platforms.

additional value cryptographic access driven The components of a key are divided among three environmental contributors: Circle members Connected Circles of Trust credentials The protected data supports consumerisation Connected Circles of Trust is a compact software which works well with federated ID, resulting in minimal IT management. Its compatibility with multiple devices per user as well as mobile platforms allows it to integrate efficiently into any work environment. If any of these components are missing, access to the file is prevented. folder-centric classification Connected Circles of Trust works well with the user s existing folder structure making it simple and intuitive to understand. An end user can easily and naturally classify data based on the regular organization of files secure cross border sharing With Connected Circles of Trust, working as a team has never been easier. Ad hoc groups can be formed easily and files can be safely transferred through any means, whether it is by USB, email, or a cloud folder. ADDITIONAL VALUE cloud file protection Secure data sync to the cloud allows a user to easily share a protected file across all of their connected devices. Even if a user s cloud storage account is hacked or accessed by an outsider, the protected files that have been uploaded cannot be decrypted. seamless access to protected files Connected Circles of Trust works with any file type and provides protection at a file system level. The seamless and transparent experience is based on virtualized access to encrypted files.

benefits on the fly encryption secure group sharing BENEFITS data protection everywhere seamless & transparent no interruption to workflow no additional passwords

use cases accidental data breaches via email emails a confidential project proposal to Bob Barker instead of her manager Bob Baker. CT prevents Bob Barker from reading the CT protected files in the email.?! Bob Barker Bob Barker WITHOUT CT Bob Baker WITH CT Bob Baker USE CASES lost usb drives misplaces a USB drive containing sensitive client data at work. Eve finds the USB. Eve cannot access any CT protected files on s USB drive.?! Eve WITHOUT CT Eve WITH CT

secure data sharing in the cloud Gene shares her sensitive design data with Hank who works at a specialty manufacturer via the Cloud. Ian, who is a member of the Cloud provider s staff, can view Gene s account but is unable to read her protected files. Hank Hank USE CASES Ian Gene WITHOUT CoT Ian?! Gene WITH CoT preserving privacy in the cloud Jennifer keeps her private photos stored on the cloud to sync with her other devices. Ken is a hacker who has broken into Jennifer s account but is prevented from seeing her encrypted photos.?! Jennifer Ken Jennifer Ken WITHOUT CoT WITH CoT

about YOUTUBE LOGO SPECS CryptoMill provides innovative data security connect with us solutions for private sector enterprises, private sector corporations, public sector corporations, main red small businesses, professionals and individuals. PRINT PMS 1795C C0 M96 Y90 K2 gradient bottom PMS 1815C C13 M96 Y81 K54 on light backgrounds YouTube: standard on dark backgrounds standard http://www.youtube.com/user/cryptomilltech Loss or theft of information can have devastating impacts on businesses and reputations. Circles WHITE of C0 M0 Y0 K0 Trust - Trust Boundaries can help mitigate these impacts. contact CryptoMill Technologies Ltd. Suite 2000, 372 Bay Street, Toronto, Ontario, Canada, M5H 2W9 Toll free: (855) 441 4333 T: (416) 241 4333 ext. 101 F: (416) 241 4333 E: info@cryptomill.com white black BLACK C100 M100 Y100 K100 Facebook: https://www.facebook.com/cryptomilltechnologies no gradients no gradients Twitter: https://twitter.com/cryptomill watermark watermark LinkedIn: http://www.linkedin.com/company/cryptomill-technologies stacked logo (for sharing only) stacked logo (for sharing only) mailing address P.O. Box 9, 31 Adelaide St. E., Toronto, Ontario, M5C 2H8 sales contact E: sales@cryptomill.com While this information is presented in good faith and believed to be accurate, CryptoMill disclaims the implied warranties of merchantability and fitness for a particular purpose and makes no express warranties except as may be stated in its written agreement with and for its customer. In no event is CryptoMill liable to anyone for any indirect, special or consequential damages. The information and specifications in this document are subject to change without notice. Printed in Canada Copyright 2015 CryptoMill Inc.