Covata Safe Share

Transcription

Covata Safe Share
TEN REASONS:
Covata Safe Share
1.& Securely Store Your Data Anywhere
7.& Multi-Tenancy
•& Safe&Share&encrypts&and&stores&virtually&any&file&
or&any&size&with&simple&drag9n9drop&
•& Encrypting&data&at&its&source&means&it&is&
protected&for&the&lifetime&of&the&file&–&at&rest&
and&in&motion&
•& Safe&Share’s&scalable&architecture&is&built&for&
telcos&and&large&enterprises&that&require&multi9
tenant&approach&to&sharing&and&storing&data&&
•& Provisioning&additional&organisations&or&
customers&is&faster,&less&expensive,&and&easier&
for&your&IT&dept.&
2.& Unique Encryption Key Per File
8.& Watermarking/Fingerprinting
•& Each&data&object&is&encrypted&with&a&strong&and&
unique&AES9256&key&
•& Safe&Share&is&always&1&key&per&file&
•& Security&risks&to&the&organisation&are&
significantly&reduced&&
•& Unique&watermark&and&fingerprint&stamp&
means&full&traceability&of&proprietary&
information&&
•& This&feature&provides&protection&for&industries&
that&routinely&handle&highly&confidential&and&
sensitive&data&such&as&governments,&finance&&&
banking,&legal,&and&healthcare&and&more&
3.& Real-Time Revocation
•& Safe&Share&allows&the&data&owner&to&revoke&
access&to&any&file,&even&after&sharing&
•& When&access&permissions&are&denied,&
collaborators&will&no&longer&have&any&access&to&
the&shared&file&
9.& Complete Mediation
•& Safe&Share&performs&an&access&check&every&
time&a&request&is&sent&to&decrypt&&
a&secured&data&object&
•& Safe&Share&requires&positive&verification&of&
identity&every&time&a&user&request&is&made&&
to&access&a&piece&of&data&
4.& Browser Cryptography
•& Safe&Share&uniquely&provides&in9browser&
encryption&whilst&maintaining&a&seamless&user&
experience&
•& Safe&Share&is&supported&by&all&major&browsers&
10.& Full Administrative Control
•& Wide&breadth&of&controls&and&visibility&options:&&
•& Manage&users,&files&and&permissions&
•& Integrate&to&corporate&directories&using&LDAP,&
whitelist&email&domains,&assign&labels,&
customised&branding&
•& Analytics&and&report&features&
•& Manage&storage&quota&plans&
•& Internationalise&the&application&&
within&Admin&console&
5.& End-to-End Encryption
•& Data&is&encrypted&the&moment&it&is&uploaded&
•& Data&remains&encrypted&in&all&applications,&
however&it&travels&and&wherever&it&is&stored&
•& Data&is&not&decrypted&until&it&reaches&the&
intended&recipient&
•& Data&designated&“view9only”&cannot&be&
forwarded/re9shared&or&downloaded&
!
6.& Data Sovereignty
•& Organisations&control&where&their&encryption&
keys&are&stored:&on9premise,&in&the&cloud&or&in&
a&trusted&data&centre&of&their&choice&
•& Data&storage&and&sharing&protocols&are&
determined&according&to&the&policies&set&by&
organisations&
•& Covata&gives&companies&control&over&where&
their&data&is&stored&
&
&
©2015&Covata&Limited&its&affiliates.&All&Rights&Reserved.& &
&
&
&&&&&&
[email protected]&|&covata.com&

Similar documents

Understanding Encryption and Cloud Security

Understanding Encryption and Cloud Security If you have additional questions about IaC, compliance, governance and best practices when it comes to validating networks, be sure to contact the experts at prancer.

More information