CipherShare Features and Benefits



Similar documents
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

SecureAge SecureDs Data Breach Prevention Solution

Securing Data on Microsoft SQL Server 2012

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

MS-55096: Securing Data on Microsoft SQL Server 2012

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Sync Security and Privacy Brief

Mobile Device Security and Encryption Standard and Guidelines

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Security Policy Revision Date: 23 April 2009

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Windows 7, Enterprise Desktop Support Technician

1 of 10 1/31/2014 4:08 PM

Service Overview CloudCare Online Backup

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

Information Security Basic Concepts

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Managed Portable Security Devices

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Keyfort Cloud Services (KCS)

FileCloud Security FAQ

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

MySQL Security: Best Practices

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Web-Based Data Backup Solutions

PRIME IDENTITY MANAGEMENT CORE

PRESENTS... Reasons to Switch from SourceSafe: How to Make Your Life Easier with SourceAnywhere Standalone

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

A Strategic Approach to Enterprise Key Management

HP ProtectTools Embedded Security Guide

GlobalSCAPE Wide Area File Services

GE Measurement & Control. Cyber Security for NEI 08-09

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Implementing and Supporting Microsoft Windows XP Professional

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver KYOCERA MITA Corporation

Security Architecture Whitepaper

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

Overview. Timeline Cloud Features and Technology

Eleventh Hour Security+

Citrix Desktop Virtualization Fast Track

Snow Agent System Pilot Deployment version

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

CMB-207-1I Citrix Desktop Virtualization Fast Track

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

2007 Microsoft Office System Document Encryption

Guide to Vulnerability Management for Small Companies

Online Backup Plus Frequently Asked Questions

Securing Distribution Automation

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Computer System Management: Hosting Servers, Miscellaneous

Content Teaching Academy at James Madison University

IBM Connections Cloud Security

Retail Deployment Guide. Microsoft Dynamics AX 2012 Feature Pack

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA USA. November v1.0

Installing, Configuring and Administering Microsoft Windows

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

MEGA Web Application Architecture Overview MEGA 2009 SP4

ICT Professional Optional Programmes

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Hitachi Content Platform (HCP)

1 Product. Open Text is the leading fax server vendor in the world. *

סילבוס -MCITP מנהלי רשתות

ARCHITECTURAL OVERVIEW Availability Service (EAS) with Activ box

Bit Chat: A Peer-to-Peer Instant Messenger

It is recommended that learners have experience administering Microsoft Windows Server 2003 environments.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Understanding the Cisco VPN Client

CTX-1259BI Citrix Presentation Server 4.5 and XenApp 5.0 for Windows Server 2003: Administration

Data Stored on a Windows Server Connected to a Network

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Lync for Mac 2011 Deployment Guide

Business and enterprise cloud sync, backup and sharing solutions

AVLOR SERVER CLOUD RECOVERY

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

Skoot Secure File Transfer

Symantec Endpoint Protection Analyzer Report

Chapter 17. Transport-Level Security

Transcription:

CipherShare s and

CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application File Protection Everywhere, "Always On" Security: CipherShare provides completely transparent encryption of all data at rest and in-flight - at the level of the individual user - throughout the data lifecycle. As well, all document/file/message/chat data are encrypted at rest both centrally and locally and during transmission. File/Object Level Permissioning: CipherShare uses individually targeted PKI based asymmetric encryption to provide fully granular disclosure (sharing) at both the object (file/chat/message) and user levels. This allows CipherShare to operate on a complete "kneed to know" basis. A user sees ONLY the data that has been explicitly shared with him/her. Without that access privilege, the user will have no access or knowledge of the data. Strong Authentication: CipherShare utilizes obfuscated password memory and edit boxes, hashed passphrases, authenticated Diffie Helman and a robust challenge response protocol to provide for secure, strong authentication. Once logged in, digital signatures are used to sign all actions, providing non-repudiation. Delegated Trust Verification: CipherShare uses transitive trust to enable rapid and secure authentication and trust relationship development. In CipherShare, a single Security Officer can verify the authenticity of each member of the workgroup, and pass the authentication status through transitive trust to each member. Asymmetric Encryption: CipherShare treats the security for all objects consistently with a single security / encryption protocol based on transparent PKI and asymmetric encryption. No Recovery by Single Administrator: Currently, CipherShare does not allow for arbitrary password recovery by an administrator. Version 3.0 will use a sophisticated key recovery system based on split keys and multiple administrative consent, which does not allow for the possibility of a rogue administrator acting alone to gain access to data. EFS and Secure Delete: CipherShare uses the following mechanisms to secure application temp files: 1) Optionally use of Microsoft's "Encrypted File Service" or EFS. 2) Secure delete (zeroing) of all temp files between sessions. Additionally, future releases will include: Symmetric and Asymmetric Algorithm matching No "Super User" 3) NTFS permission restriction based on Windows access permission. 4) Share permission override monitoring to check for rogue administration access. NIST Compliance: With Version 2.2, CipherShare will offer full compliance with NIST guidelines for asymmetric and symmetric key algorithm matching (for example, NIST calls for the use of SHA-512 as a hashing algorithm for AES 256). CipherShare will utilize high performance elliptic curve (EC) algorithms to provide asymmetric encryption for all shared data throughout the data lifecycle. Prevention of Insider Threat: CipherShare's transparent integration of PKI and encryption completely separates administrative functions from content, preventing the possibility of "rogue" administrators having the ability to access and exploit data within the CipherShare system. Copyright 2003. Kasten Chase Applied Research Limited. All rights reserved. V2.0Page 2 of 5

CipherShare s and Document Management Versioning Check-in/Check-out Auto-Notification Non-Repudiable Version History: CipherShare offers full delta versioning at the binary level, regardless of format or type. Each delta is digitally signed. CipherShare maintains an auditable version history of any file or document enabling non-repudiation at the version/modification level. Editorial Control: CipherShare offers check-in/check-out and document/file locking to ensure that editorial conflicts do not occur, and that version histories can be fully tracked and audited. Real-time Interaction: CipherShare immediately broadcasts encrypted metadata to authorized members of the share list, and so offers better "real-time" interaction among share members. Document/File Meta-data Data on Demand: CipherShare tightly couples meta data with each file/document. CipherShare allows users to view meta-data independently of the associated object, and download object (file/document) data on demand. Search Integrated Spellchecking n-tier Folder Structure Digital Signatures Chat Selective Chat Participation Messaging Securely Encrypted Messages Rapid Access to Documents: CipherShare's meta data handling allows complex search and filtering functions to be offered. As well, CipherShare offers full content search for both documents and messages. "On-the-fly" Spell Checking: CipherShare has integrated spell checking for all message and chat data which offers users the ability immediately correct spelling. Customized Content Structure: CipherShare offers a fully customizable n-tier document/file structure, allowing an organization to develop a content structure that reflects their operational and knowledge management practices. Strong Identification and Non-repudiation: CipherShare offers digital signatures for all data and objects including documents, files, versions, messages, chat sessions, share lists, etc. This feature, coupled with CipherShare's strong authentication, ensures that actions performed by users are tracked at the level of their digital signature, providing nonrepudiation. Privacy: CipherShare enables fully private and encrypted chat sessions between specific members of a workgroup. As well, CipherShare has no limit - outside of system resources - on the number of chat instances to be run simultaneously. Each chat session is a fully private channel between participants Privacy and Non-Repudiation: All CipherShare messages, chats and data are contained in encrypted form within the CipherShare environment. All messages are digitally signed. Copyright 2003. Kasten Chase Applied Research Limited. All rights reserved. V2.0Page 3 of 5

Bandwidth Optimization File / Data Transfer Optimization Delta Versioning File Compression Granular Access Client / User Mobility Roaming Secure Workspace Loss Recovery and Theft Prevention Usability Intuitive Collaborative s Streaming Encryption of all File Types: CipherShare utilizes high efficiency streaming encryption and "smart" upload / download managers to offer full resumability for arbitrary file sizes and formats including document, movie, audio and CAD/CAM. Minimal Data Transfer: CipherShare uses source file (binary level) delta-versioning to provide highly efficient data transfer for all file types and formats, versioning control, auditing and high efficiency bandwidth usage. Minimal Storage Impact: All data stored and transferred through CipherShare is compressed prior to encryption, allowing for storage gains of up to 15:1, depending on file format. Minimal Data Replication: Because of CipherShare's granular disclosure and workgroup creation abilities, sharing data between workgroup members does not require the creation of a new workspace area, but can be easily supported within a larger community of users. This minimizes confusion and data replication. Rapid Mobility: Roaming with CipherShare is very simple, requiring only a TCP/IP connection to connect to a CipherShare server from anywhere. Local Data Protection: CipherShare's fully encrypted local cache prevents theft of data through strong encryption. As well, a CipherShare user can easily recover his/her data by installing a new CipherShare client and connecting to the CipherShare server. High Performance: CipherShare's user interface is high performance and "clean", offering intuitive collaborative and file sharing services. Well Structured Interface Low Learning Curve: CipherShare's functions are consistent and easy to learn. Standard Models Simple Administration Accepted Document Management Models: CipherShare uses generally accepted editing and document management models including "Check-in/Check-out", document locking, autoversioning and auto-notification. Rapid Deployment: CipherShare's administration functions are simple and function autonomously. No specific technical expertise is required and CipherShare's PKI infrastructure is transparently created without the need for additional software. Copyright 2003. Kasten Chase Applied Research Limited. All rights reserved. V2.0Page 4 of 5

CipherShare s and Architecture Client-Server Centralized Repository Synchronization: CipherShare's client / server architecture ensures that everyone sees the same server state, enables synchronized operations such as locking, and supports more efficient network transmissions; Data Centralization: CipherShare's client / server architecture allows for true store and forward, centralized master database repository and backup. Bandwidth Efficiency: The CipherShare server offers download on demand with source transfer rates independent of peer connection speeds. Server-based Store and Forward Secure Local Repository Secure Off-line Access: CipherShare's client/server framework offers fully encrypted local caching of synchronized content, enabling secure off-line access and editing and theft prevention. TCP/IP C++ Installation & Configuration Broad Platform Support Simple Installation and Low Installed Footprint Configurable Ports Auto-upgrade Detection Accessibility: CipherShare can be used with any standard Internet or dial-up connection. No additional specialized hardware or software is needed. Performance: As a C++ application, CipherShare's application performance is very high for both the client and server. Inclusivity: Client is supported on all 98+ Windows platforms (98 / Me / 2000 / XP) extending CipherShare's end-to-end security and encryption to older computers. No Specialized Expertise: CipherShare's client / server application is simple to install and - at 3.5 megabytes fully installed - has a very low footprint. Deployment is straightforward and requires no specialized expertise. Because of its small size and highly efficient memory usage, CipherShare has a very limited impact on client machines. Generally, no additional RAM or hard drive space is needed. Granular Control: CipherShare Server ports can be easily customized and pre-configured for any collaborative group or context, enabling very granular firewall configuration and control over CipherShare related traffic. Ease of Deployment: CipherShare's auto upgrade detection services enables rapid distribution of new client upgrades without the need for intervention by MIS staff. About Proven Security Solutions Proven Security Solutions is a software development and consulting company specializing in highly secure and completely transparent applications of encryption and key management. Proven Security's mission is simple - making state-of-the-art cryptographic security an invisible component of high value software applications. For more information on, please visit www.provensecuritysolutions.com or e-mail us at info@provensecuritysolutions.com. Copyright 2003. Kasten Chase Applied Research Limited. All rights reserved. V2.0Page 5 of 5