Credibly secure cloud storage with elfcloud

Similar documents
Mobile Admin Security

Security Policy Revision Date: 23 April 2009

Security Overview Enterprise-Class Secure Mobile File Sharing

Service Overview CloudCare Online Backup

Complying with PCI Data Security

BOWMAN SYSTEMS SECURING CLIENT DATA

How To Secure Your Data Center From Hackers

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Alliance Key Manager A Solution Brief for Technical Implementers

TOP SECRETS OF CLOUD SECURITY

Security Architecture Whitepaper

Dashlane Security Whitepaper

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

FileCloud Security FAQ

Xerox DocuShare Security Features. Security White Paper

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Business and enterprise cloud sync, backup and sharing solutions

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Enterprise Remote Support Network

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

Introduction to the Mobile Access Gateway

Overview. SSL Cryptography Overview CHAPTER 1

Mirantis OpenStack Express: Security White Paper

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Introduction to Mobile Access Gateway Installation

Copyright Telerad Tech RADSpa. HIPAA Compliance

File Sharing and Network Marketing

Host Access Management and Security Server

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

HIPAA and Cloud IT: What You Need to Know

D50323GC20 Oracle Database 11g: Security Release 2

SECURITY DOCUMENT. BetterTranslationTechnology

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Internet Programming. Security

Introduction to the EIS Guide

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Symantec Enterprise Vault for Microsoft Exchange

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

DreamFactory Security Whitepaper Customer Information about Privacy and Security

The Security Behind Sticky Password

Okta/Dropbox Active Directory Integration Guide

Oracle Database 11g: Security Release 2

DiamondStream Data Security Policy Summary

Cloud security and OpenStack Primož Cigoj Laboratorij za odprte sisteme in mreže IJS-E5.

Mobile Admin Architecture

Introduction to the AirWatch Cloud Connector (ACC) Guide

Mobile Device Management Solution Hexnode MDM

M Y S E C U R E B A C K U P. p r o d u c t o v e r v i e w O N L I N E B U S I N E S S B A C K U P

A Strategic Approach to Enterprise Key Management

Our Key Security Features Are:

Security Specifications

How To Use Egnyte

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

GET IN NOW Step 2: Add Users

FTP-Stream Data Sheet

Security Whitepaper. NetTec NSI Philosophy. Best Practices

EXAM - ST Symantec PGP Universal Server 3.2 Technical Assessment. Buy Full Product.

FTA Computer Security Workshop. Secure

Security Solutions

BlackBerry Enterprise Service 10. Version: Configuration Guide

How To Use Quantum Rbs Inc. Small Business Backup

PRIVACY, SECURITY AND THE VOLLY SERVICE

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Active Directory Self-Service FAQ

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Casper Suite. Security Overview

BeBanjo Infrastructure and Security Overview

Securing Data in Oracle Database 12c

Comparing Box and Egnyte. White Paper

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Protected Trust Setup Guide for Brother MFC Devices

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Vendor Questions. esignatures Request for information InsureSign

owncloud Architecture Overview

Administration Guide Novell Filr May 2014

Chapter 10. Cloud Security Mechanisms

LBSEC.

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Security Overview kiteworks

Secure any data, anywhere. The Vera security architecture

White Paper. BD Assurity Linc Software Security. Overview

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Angel Dichev RIG, SAP Labs

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

E-commerce: Competing the Advantages of a Mobile Enterprise

An Enterprise Approach to Mobile File Access and Sharing

Deploy Remote Desktop Gateway on the AWS Cloud

User Roles & Adding Domains & Users

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

Transcription:

Credibly secure cloud storage with elfcloud Privacy of private clouds with the cost of the public cloud Datacenter IaaS workshop 2014 / 12.9.2014 Tuomas Tonteri Founder and CEO

Abstract elfcloud is a Finland based secure cloud platform. The platform combines the privacy of private clouds with cost-efficiency and ease of maintenance of the public clouds. The entire architecture has been designed from the ground up with primary focus on information security and end-user privacy. Content is always encrypted locally on the users' device before transmitting to the cloud. The content keys are never sent to or stored on the elfcloud servers in usable format. Secure cloud assisted key sharing within and across organizations is supported and facilitated in a user-friendly manner. The elfcloud platform provides open APIs and open-source client libraries as well as a set of readily available client applications for day-to-day file management, sharing, folder synchronization and backups.

elfcloud Mission and Motivation What we wanted to solve... Content ownership, access authorization and control for the content owners Usefulness of the cloud is obvious, but after decades of building firewalls why would one store important files outside? Why would anyone really trust the provider? Brand? Cost? Volume? Better store random byte streams! The big provider, my password and HTTPS is there, but the servers can still be hacked or stolen, right? How to securely store, use and share enterprise passwords? Legislation and embargo related issues with foreign providers Local operation with reachable people and support, readiness to make customer specific customizations and deployments Very affordable solution also for small organizations and consumers

elfcloud History and Today Development started in 2010, growing from elfconsulting security evaluation and auditing business to answer secure cloud needs Closed pilot customers with a local brand in early 2012 Public availability and re-branded as elfcloud H2/2012 Three consumer and three corporate standard packages available with prices in the 10-120 euros monthly cost range Today thousands of users and hundrends of businesses signed up Desktop platforms and first mobile platforms are now supported. Active focus on building retailer and partnership network

So what's the difference? Some Cloud Folder Internet Data is securely transmitted and then encrypted on the server. Key is stored with the data. Password reset and web access possible.

So what's the difference? elfcloud Secure Storage Access your content securely from anywhere, with any device and at any time. Share as needed. Internet Data is always locally encrypted before transit Key never goes to the server side in usable format Secured while in transit and in storage Data is kept within Finland, no export control or embargo issues with any type of data

elfcloud Service Functionality All applications share the principle of local encryption. File management (Beaver, Weasel, FUSE) Password management (Crow) with password folder sharing Folder synchronization (Mockingbird) Automated backups (Nightjar) Open back-end API and open source client libraries API: HTTP/JSON + raw HTTP (over TLS) Libraries: C++, Java, Python, Objective-C

elfcloud Service Functionality User authentication and folder access distinct from crypto keys and possibility to decrypt and access file contents For example, IT admins can still take offline backups or manage the folder hierarchy without being able to read the documents. Content owners can truly manage distribution without technical skills. No practical limit on the stored file size Possible to use web link for sharing files through browser download Account and contact level trust relationships for inter-account crypto key sharing and convenient address book based privileges management for users, groups, organization units

elfcloud Architecture and Security Model Client Application Cipher Engine AES 256, others Local Cipher Key Management, Cloud Key Exchange PKI Protected Authentication Proxy for AD/ LDAP integrated deployments. Keeps AD credentials local. Customer DC Multi-platform API Library, Standard HTTP/SSL Client Internet Outbound TCP/443 only Cipher Key Sharing & Backup Load Balancing API API API Slice Redirector Distributed Filesystem Off-site Replication Redundant Disks and Backup Rotation ACL, Audit trail ACL, Audit trail Trust Relationships Username and password authentication Vault access control rules DataItem specific cipher key selection Indisputable audit log of access/sharing Account level CA RSA key-pair Each user of account creates a pair User public keys are signed by CA. Signatures verifiable cross-account. Keys delivered to elfcloud Inbox personally encrypted and signed Back-end databases Backup keys by encrypting for yourself. Corporate continuity ensured by policy based key backup.

Contact Further information, customization and partnership enquiries Tuomas Tonteri +358-40-3563251, tuomas.tonteri@elfcloud.fi https://www.linkedin.com/in/tuomastonteri