circles of trust - s3.amazonaws.combriefs/connected... · circles of trust™ is an enterprise...
Post on 17-Feb-2019
213 Views
Preview:
TRANSCRIPT
p1
product overviewCircles of Trust™ is an enterprise security software system that eliminates the risks associated with leaked assets and data breaches resulting from inadvertent copying, hacker attacks on network, cloud, emails, or data leaks through lost and stolen devices.
Using CryptoMill Trust Boundaries technology, assets are cryptographically bound to a select group of users and devices. Circles of Trust™ employs folder-centric file encryption to provide an intuitive “trusted circle” asset-sharing capability. The application encrypts assets in a user’s specific folders, protecting each one within a Circle of Trust. Once protected, the assets can be shared and used by only members of the Circle. If a protected asset
ends up in the wrong hands (a non-member), it is unreadable and unusable - it stays protected and cannot be decrypted.
Circles of Trust™ supports all file formats - no plugins required. It offers central management, multiple device sync, mobile device readers and protection of cloud storage.
Circles of Trust™ security capability is API-driven and can be integrated with existing business processes. Encryption can be automated so that any time sensitive data is exported, it is protected. You also have the ability to revoke access to any assets anytime, anywhere.
protecting your digital assets
We create an impenetrable Circle around groups authorized to work with sensitive assets
Division of administrative roles eliminates internal rogue activity
firewalls can be breached. networks can be hacked.
• Critical assets at organizations include documents, images, videos, intellectual property• There are many uses of these critical assets• Various groups need to work with these assets
threats we eliminate
lost / stolen devices
• Accidental
• Malicious
wrong recipient
• Email Errors
• Intentional Leaks
cyber attacks
Hackers / Rogue Employees
• Network
• Firewall
• Cloud
• Device
p2
edit, view and collaborate workflow
availability
iOS Devices AndroidWindows Mac OS X
Work inprogress
On Premise
AssetStorage
Circles of Trust™Encryption Services
Edit
View
Finished Assets Delivery& Confirmations
1. Export with CoT- Choose Recipients and Boundaries (Time / Event Expiry, Level of access)
2. API call:- Create Circle
- Encrypt the assets
Partners / Agencies (Edit & Collaborate)
Trust View
Trust Edit
Reviews & Approvals(View Only)
levels of access
Web View (Level 1)Trust View (Level 2)Trust Edit (Level 3)• No Download• Access through any browser
• No Install• Sandbox Viewer • No Export,
No Screen Capture
• Full Install• Edit and Collaborate
p3
features & benefits
mobilityData can be shared securely on any device. Laptops, tablets, smartphones, BYOD, Windows, Mac, iOS, Android.
offline accessCircles of Trust™ is functional offline. You can access documents securely anywhere, anytime.
convenient securityCircles of Trust™ works for you in the background. No extra passwords, no interruption to workflow, no reworking of business processes.
revocation & time expirationOrganizations have full control over how long sensitive data can be shared. Time or Event-based expiration for the documents make them unreadable / unusable beyond the set date or event.
audit and loggingCircles of Trust™ provides detailed logs and
statistics pertaining to user activities, Circle events
and protected file operations (including copy,
move, decrypt).
strong securityRemote locations, underground, public transport, network outages, airplane mode. Access documents anywhere, anytime.
simplicityEasy integration with existing business process.
secure cross-border sharingTakes the complexity out of securely sharing your data. Circles of Trust™ provides a simple and intuitive workflow for collaborating outside your organization.
cloud compatibilityData protected by Circles of Trust™ protects itself -- only Circle members can access it. Cloud administrators and government entities cannot gain access. Cloud Support currently – OneDrive, Box, DropBox, Google Drive, Apple iCloud, ShareFile.
varied levels of accessTrust Edit empowers users to collaborate securely. Trust View creates a view-only sandbox, that prevents the copying and forwarding of your data to untrusted parties. Web View provides instant secure view access from any web browser, without the need to install any plug-ins or software.
easy on-boardingCircles of Trust™ allows you to easily add members to your Circles from inside or outside your organization. Any member can easily access the protected data immediately and with little effort.
all file formatsYou work with all types of digital files - documents, spreadsheets, images, videos, even your custom or legacy formats. We’ve got it covered. Circles of Trust™ works with all file formats.
low total cost of ownershipWith its small footprint and minimal hardware requirements, Circles of Trust™ is a budget-friendly solution that will give immediate returns on your investment.
key managementIn your dynamic business, situations change,
people come and go, new work groups are formed.
Easily control Circle membership, recover data,
grant and revoke access. Tap into your existing
digital hierarchy with Circles of Trust™ support for
Active Directory.
p4
secure sharing in the cloud
Gene shares video clips from the upcoming movie with Hank who works at a 3D studio for editing via the Cloud.
A network / cloud hacker gets unauthorized access to Gene’s account but is unable to read her protected assets.
Hank Hank
Hacker ?!Gene
Hacker
Gene
WITHOUT Circles of Trust™ WITH Circles of Trust™
use cases
control over shared assets
Jennifer sends the upcoming movie for review to the external agency.
Ken at the reviewing agency can only view the movie preventing copying and sharing.
WITHOUT Circles of Trust™ WITH Circles of Trust™
Jennifer Ken Jennifer
View Only
Ken
Copy
p5
accidental data breaches via email
Alice emails a confidential movie script to Bob Barker instead of the director Bob Baker.
Circles of Trust™ prevents Bob Barker from reading the Circles of Trust™ protected assets in the email.
lost usb drives
Alice misplaces a USB drive containing sensitive movie assets at work. Eve finds the USB.
Eve cannot access any Circles of Trust™ protected assets on Alice’s USB drive.
Alice
Bob Barker
Bob Baker
WITHOUT Circles of Trust™
WITHOUT Circles of Trust™
WITH Circles of Trust™
WITH Circles of Trust™
?!
?!
Eve
Alice
Alice
Bob Barker
Bob Baker
Eve
Alice
p6
about
Printed in Canada © Copyright 2018 – CryptoMill Cybersecurity Solutions.
CryptoMill Cybersecurity Solutions is an innovative security software company, with disruptive technologies that address security and privacy related issues from the edge to the cloud.
CryptoMill suite of security software products eliminate the risks associated with data breaches from a hacker attack on a network, cloud (any cloud), email, as well as data leaks through lost or stolen devices.
contactCryptoMill Cybersecurity SolutionsSuite 301, 100 Front Street East, Toronto, Ontario, Canada, M5A 1E1Toll free: (855) 441 4333T: (416) 241 4333 ext. 101F: (416) 241 4333E: info@cryptomill.com
sales contactE: sales@cryptomill.com
connect with us
YouTube: http://www.youtube.com/user/CryptoMillTech
Facebook: https://www.facebook.com/CryptoMill
Twitter: https://twitter.com/CryptoMill
LinkedIn: http://www.linkedin.com/company/CryptoMill-Technologies
main red
PMS 1795CC0 M96 Y90 K2
YOUTUBE LOGO SPECS
PRINTgradient bottom
PMS 1815CC13 M96 Y81 K54
on dark backgroundson light backgrounds
standard
no gradients
watermark
stacked logo (for sharing only)
standard
no gradients
watermark
stacked logo (for sharing only)
white
WHITEC0 M0 Y0 K0
black
BLACKC100 M100 Y100 K100
top related