circles of trust - s3.amazonaws.combriefs/connected... · circles of trust™ is an enterprise...

8
Product Brief Circles of Trust™ www.cryptomill.com

Upload: dinhdiep

Post on 17-Feb-2019

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

Product Brief

Circles of Trust™

www.cryptomill.com

Page 2: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p1

product overviewCircles of Trust™ is an enterprise security software system that eliminates the risks associated with leaked assets and data breaches resulting from inadvertent copying, hacker attacks on network, cloud, emails, or data leaks through lost and stolen devices.

Using CryptoMill Trust Boundaries technology, assets are cryptographically bound to a select group of users and devices. Circles of Trust™ employs folder-centric file encryption to provide an intuitive “trusted circle” asset-sharing capability. The application encrypts assets in a user’s specific folders, protecting each one within a Circle of Trust. Once protected, the assets can be shared and used by only members of the Circle. If a protected asset

ends up in the wrong hands (a non-member), it is unreadable and unusable - it stays protected and cannot be decrypted.

Circles of Trust™ supports all file formats - no plugins required. It offers central management, multiple device sync, mobile device readers and protection of cloud storage.

Circles of Trust™ security capability is API-driven and can be integrated with existing business processes. Encryption can be automated so that any time sensitive data is exported, it is protected. You also have the ability to revoke access to any assets anytime, anywhere.

protecting your digital assets

We create an impenetrable Circle around groups authorized to work with sensitive assets

Division of administrative roles eliminates internal rogue activity

firewalls can be breached. networks can be hacked.

• Critical assets at organizations include documents, images, videos, intellectual property• There are many uses of these critical assets• Various groups need to work with these assets

threats we eliminate

lost / stolen devices

• Accidental

• Malicious

wrong recipient

• Email Errors

• Intentional Leaks

cyber attacks

Hackers / Rogue Employees

• Network

• Firewall

• Cloud

• Device

Page 3: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p2

edit, view and collaborate workflow

availability

iOS Devices AndroidWindows Mac OS X

Work inprogress

On Premise

AssetStorage

Circles of Trust™Encryption Services

Edit

View

Finished Assets Delivery& Confirmations

1. Export with CoT- Choose Recipients and Boundaries (Time / Event Expiry, Level of access)

2. API call:- Create Circle

- Encrypt the assets

Partners / Agencies (Edit & Collaborate)

Trust View

Trust Edit

Reviews & Approvals(View Only)

levels of access

Web View (Level 1)Trust View (Level 2)Trust Edit (Level 3)• No Download• Access through any browser

• No Install• Sandbox Viewer • No Export,

No Screen Capture

• Full Install• Edit and Collaborate

Page 4: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p3

features & benefits

mobilityData can be shared securely on any device. Laptops, tablets, smartphones, BYOD, Windows, Mac, iOS, Android.

offline accessCircles of Trust™ is functional offline. You can access documents securely anywhere, anytime.

convenient securityCircles of Trust™ works for you in the background. No extra passwords, no interruption to workflow, no reworking of business processes.

revocation & time expirationOrganizations have full control over how long sensitive data can be shared. Time or Event-based expiration for the documents make them unreadable / unusable beyond the set date or event.

audit and loggingCircles of Trust™ provides detailed logs and

statistics pertaining to user activities, Circle events

and protected file operations (including copy,

move, decrypt).

strong securityRemote locations, underground, public transport, network outages, airplane mode. Access documents anywhere, anytime.

simplicityEasy integration with existing business process.

secure cross-border sharingTakes the complexity out of securely sharing your data. Circles of Trust™ provides a simple and intuitive workflow for collaborating outside your organization.

cloud compatibilityData protected by Circles of Trust™ protects itself -- only Circle members can access it. Cloud administrators and government entities cannot gain access. Cloud Support currently – OneDrive, Box, DropBox, Google Drive, Apple iCloud, ShareFile.

varied levels of accessTrust Edit empowers users to collaborate securely. Trust View creates a view-only sandbox, that prevents the copying and forwarding of your data to untrusted parties. Web View provides instant secure view access from any web browser, without the need to install any plug-ins or software.

easy on-boardingCircles of Trust™ allows you to easily add members to your Circles from inside or outside your organization. Any member can easily access the protected data immediately and with little effort.

all file formatsYou work with all types of digital files - documents, spreadsheets, images, videos, even your custom or legacy formats. We’ve got it covered. Circles of Trust™ works with all file formats.

low total cost of ownershipWith its small footprint and minimal hardware requirements, Circles of Trust™ is a budget-friendly solution that will give immediate returns on your investment.

key managementIn your dynamic business, situations change,

people come and go, new work groups are formed.

Easily control Circle membership, recover data,

grant and revoke access. Tap into your existing

digital hierarchy with Circles of Trust™ support for

Active Directory.

Page 5: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p4

secure sharing in the cloud

Gene shares video clips from the upcoming movie with Hank who works at a 3D studio for editing via the Cloud.

A network / cloud hacker gets unauthorized access to Gene’s account but is unable to read her protected assets.

Hank Hank

Hacker ?!Gene

Hacker

Gene

WITHOUT Circles of Trust™ WITH Circles of Trust™

use cases

control over shared assets

Jennifer sends the upcoming movie for review to the external agency.

Ken at the reviewing agency can only view the movie preventing copying and sharing.

WITHOUT Circles of Trust™ WITH Circles of Trust™

Jennifer Ken Jennifer

View Only

Ken

Copy

Page 6: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p5

accidental data breaches via email

Alice emails a confidential movie script to Bob Barker instead of the director Bob Baker.

Circles of Trust™ prevents Bob Barker from reading the Circles of Trust™ protected assets in the email.

lost usb drives

Alice misplaces a USB drive containing sensitive movie assets at work. Eve finds the USB.

Eve cannot access any Circles of Trust™ protected assets on Alice’s USB drive.

Alice

Bob Barker

Bob Baker

WITHOUT Circles of Trust™

WITHOUT Circles of Trust™

WITH Circles of Trust™

WITH Circles of Trust™

?!

?!

Eve

Alice

Alice

Bob Barker

Bob Baker

Eve

Alice

Page 7: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

p6

about

Printed in Canada © Copyright 2018 – CryptoMill Cybersecurity Solutions.

CryptoMill Cybersecurity Solutions is an innovative security software company, with disruptive technologies that address security and privacy related issues from the edge to the cloud.

CryptoMill suite of security software products eliminate the risks associated with data breaches from a hacker attack on a network, cloud (any cloud), email, as well as data leaks through lost or stolen devices.

contactCryptoMill Cybersecurity SolutionsSuite 301, 100 Front Street East, Toronto, Ontario, Canada, M5A 1E1Toll free: (855) 441 4333T: (416) 241 4333 ext. 101F: (416) 241 4333E: [email protected]

sales contactE: [email protected]

connect with us

YouTube: http://www.youtube.com/user/CryptoMillTech

Facebook: https://www.facebook.com/CryptoMill

Twitter: https://twitter.com/CryptoMill

LinkedIn: http://www.linkedin.com/company/CryptoMill-Technologies

main red

PMS 1795CC0 M96 Y90 K2

YOUTUBE LOGO SPECS

PRINTgradient bottom

PMS 1815CC13 M96 Y81 K54

on dark backgroundson light backgrounds

standard

no gradients

watermark

stacked logo (for sharing only)

standard

no gradients

watermark

stacked logo (for sharing only)

white

WHITEC0 M0 Y0 K0

black

BLACKC100 M100 Y100 K100

Page 8: Circles of Trust - s3.amazonaws.comBriefs/Connected... · Circles of Trust™ is an enterprise security software system that eliminates the risks associated with ... Hackers / Rogue

Product Brief

www.cryptomill.com