Problem. Solution. Quatrix is professional, secure and easy to use file sharing.



Similar documents
FTP-Stream Data Sheet

Document control for sensitive company information and large complex projects.

FTP-Stream Module: InstantShare End User Guide

Welcome to Sookasa. Getting Started Guide for SafeMonk users

Welcome to ncrypted Cloud!

Mac OS X User Manual Version 2.0

How to install and use the File Sharing Outlook Plugin

Safeguard Protected Health Information With Citrix ShareFile

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

Cloud Web Portal User Guide Version 2.0

Mimecast Large File Send

ShareFile provides effective collaboration and file access wherever and whenever you need it. WHITE PAPER ShareFile by Citrix.

MassTransit vs. FTP Comparison

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

File Sharing & Collaboration

Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows User Guide. Version 3.9.0

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

About DropSend. Sending Files with DropSend

SecureSend File Transfer Portal Usage Guide

Top Five Ways Any Business Can Benefit from Box

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Security Solutions

FileCloud Security FAQ

WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

HMRC Secure Electronic Transfer (SET)

Security Considerations

Blue Jeans Network Security Features

Texas Medicaid & Healthcare Partnership (TMHP)

End-User Reference Guide

Comparing Box and Egnyte. White Paper

CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.

End-User Reference Guide

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

Copyright Telerad Tech RADSpa. HIPAA Compliance

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Egnyte Cloud File Server. White Paper

User Guide. What is AeroFS. Installing AeroFS. Learn How to Install AeroFS and get started syncing and sharing securely INTRODUCTION

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Simple, Secure User Guide for OpenDrive Drive Application v for OS-X Platform May 2015

4. Click Next and then fill in your Name and address. Click Next again.

Online File Folder. Getting Started Guide. Become an Expert at Managing Your Files Online. wind. Online File Folder // Getting Started Guide

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

How to access and reply to an Egress Switch Secure free of charge. Opening a Switch Secure New User

Secure Frequently Asked Questions

MSGCU SECURE MESSAGE CENTER

Using Voltage Secur

Upon Installation, Soda

Receiving Secure from Citi For External Customers and Business Partners

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

Secure any data, anywhere. The Vera security architecture

MessageGuard 3.0 User Guide

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

ShareFile Enterprise for healthcare

Secure User Guide

Move to the cloud without compromising security

owncloud Architecture Overview

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

Citrix ShareFile Enterprise: a technical overview citrix.com

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Gladinet Cloud Backup V3.0 User Guide

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

ShareFile Enterprise. Jaan Feldmann Sergei Sokolov

For example some Bookkeepers are using Dropbox to share the accounting files between them and their client.

Doing Business Faster with Secure File Sharing. A File Sharing Solution Buyer s Guide for Corporate IT

Secure and control how your business shares files using Hightail

Copyright 2013 Trend Micro Incorporated. All rights reserved.

How To Connect Your Cloud

White paper. Why Encrypt? Securing without compromising communications

Egnyte for Power and Standard Users. User Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PrivaSphere Gateway Certificate Authority (GW CA)

TIBCO Slingshot User Guide

Encrypting your Communications using PGP

Instruction Manual for BicDroid QDocument

FilesAnywhere Feature List

EJGH Encryption User Tip Sheet of 8

How to Use Your Office 365 Account

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty

COLLEAGUES. CLIENTS. CONNECTED. CLOUD.

OpenText Managed File Transfer (MFT) is an enterprise

Transcription:

Quatrix Data Sheet

Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities in compliance and information security policies. The infiltration of these services into the business process has been driven by their consumer led ease of use. The downside of this is the rudimentary central controls available and associated consumer branding, even on the Professional service offers. Solution Quatrix is professional, secure and easy to use file sharing. Quatrix by Maytech provides simple one step web based file sharing for end users with enterprise level controls, empowering IT to enforce compliance, data protection and information security policies through granular administrative controls and a full audit trial. Quatrix is also white labelled to fully integrate with your brand and corporate identity. Files are securely shared over HTTPS and protected at rest using AES-256 encryption which is suitable for most business workflows. In addition, there is a unique user friendly PGP encryption feature which provides advanced security for highly confidential data. This is disabled as a default setting but can be enabled as a global setting by the account administrator. For more information on our PGP encryption feature please see the relevant section at the end of this document. September 2015 Author: Maytech Version: 3.3 2 of 6

Key Features Central provisioning and strong administrative controls. Comprehensive tracking for users and admins shows both historic and in progress shares with full details of recipients, files shared and download status. Comprehensive audit trail for administrators. AES-256 encryption as standard. Optional PGP public key encryption provides advanced security. Unique data acquisition functionality through the share to me and request files features. Shared folders (available on some browsers). Easy drag and drop file sharing. White labelled to match you corporate branding. Outlook Plug-in. Maytech Drive with Desktop sync (coming soon). Sharing Files Sharing files through Quatrix is easy though the share form. Drag and drop from the desktop or cloud storage to share files or folders, it s as easy as sending an email. Users can define optional settings for the share: password protection, release and expiry dates, notification on download and include a share to me link for the recipient to return files. Quatrix Share Form September 2015 Author: Maytech Version: 3.3 3 of 6

Receiving Files Quatrix can also be used to return files to the sender through a secure, branded interface. Using the return to me feature, files can be shared with a link for files to be returned through (useful for document approval/ documents for signature etc). Or using the request files feature to send a link for files to be uploaded through securely. Administrative Functions The administrator adds and manages Quatrix users and controls account-wide settings which include: Form and message branding. Editor to add a universal message footer/disclaimer text. Create a hidden BCC field for all messages. Central tracking for all Quatrix activity across all users. Central share controls: public, tracked and restricted. Global and per user language settings. September 2015 Author: Maytech Version: 3.3 4 of 6

Key Benefits For End Users Easy one step file sharing. Send any file up to 10GB. Built-in address book. Set release and expiry dates. Password protect files. Notifications on download. Generate and send links to acquire files from external contacts. Personal tracking - a comprehensive history showing full detail on all files shared, downloaded and acquired. Revoke shared files. Project folders. For IT Quick to provision, integrate and scale. Rapid end-user adoption and acceptance. Underpinned by full enterprise security features. Data is encrypted in transit with HTTPS and at rest with AES-256 bit encryption as standard. Comprehensive logs and tracking for all user activity. Central control over: Password policies Branding and integration Compliance/disclaimer email footers. PGP encryption for highly sensitive files. 24/7 phone and email support. Why PGP? AES-256 is the industry standard level of encryption for data at rest and uses a single key to encrypt and decrypt your data. This level of encryption is sufficient for most business workflows. PGP (Pretty Good Privacy) is a higher level of encryption that ensures that no one but the intended recipient is able to access your data, making it suitable if you re sharing highly sensitive data. It uses one key to encrypt the file (the public key) and another to decrypt (the private key) which traditionally makes it much more cumbersome to use than standard levels of encryption. With Quatrix PGP is uniquely built it into the browser to add an enhanced level of end-to-end security with the ease of use of a single click. Putting it simply, encrypting files is like locking them in a chest. AES-256 uses the same key to lock and unlock the chest and PGP uses two keys. September 2015 Author: Maytech Version: 3.3 5 of 6

About Maytech Maytech provide a cloud platform for secure and reliable data transfer. Organisations in 35 countries spanning 60 industries rely on Maytech s network for mission critical workflows including file sharing, data collection and distribution. A comprehensive suite of controls enables compliance with global security and privacy standards. Maytech operate a global data network with hubs providing accelerated transfers and fast regional downloads worldwide. The company is privately held and backed by MXC Capital - a specialist in the TMT sector. Product Overview Maytech s product suite features central administrative controls, full user audit trails, end-to-end data encryption and comply with international security standards including PCI-DSS and EU Data Protection. Professional, secure and easy to use file sharing Professional, secure file sharing with enterprise level controls empowering IT to enforce compliance, data protection and information security policies. Custom API for specific workflow requirements. Advanced data transfer platform providing a unique site with granular administration controls and compliant with global security standards. The fastest and most reliable file transfer to and from China for files of any size. We provide solutions to the following areas: In-house FTP-replacement. Big data transfers including China. Unsanctioned file services replacement. PCI DSS compliancy. Challenging file transfer. We would be happy to talk to you about solving these problems with one platform. Please contact us for more information. September 2015 Author: Maytech Version: 3.3 6 of 6