Covata Safe Share
Transcription
Covata Safe Share
TEN REASONS: Covata Safe Share 1.& Securely Store Your Data Anywhere 7.& Multi-Tenancy •& Safe&Share&encrypts&and&stores&virtually&any&file& or&any&size&with&simple&drag9n9drop& •& Encrypting&data&at&its&source&means&it&is& protected&for&the&lifetime&of&the&file&–&at&rest& and&in&motion& •& Safe&Share’s&scalable&architecture&is&built&for& telcos&and&large&enterprises&that&require&multi9 tenant&approach&to&sharing&and&storing&data&& •& Provisioning&additional&organisations&or& customers&is&faster,&less&expensive,&and&easier& for&your&IT&dept.& 2.& Unique Encryption Key Per File 8.& Watermarking/Fingerprinting •& Each&data&object&is&encrypted&with&a&strong&and& unique&AES9256&key& •& Safe&Share&is&always&1&key&per&file& •& Security&risks&to&the&organisation&are& significantly&reduced&& •& Unique&watermark&and&fingerprint&stamp& means&full&traceability&of&proprietary& information&& •& This&feature&provides&protection&for&industries& that&routinely&handle&highly&confidential&and& sensitive&data&such&as&governments,&finance&&& banking,&legal,&and&healthcare&and&more& 3.& Real-Time Revocation •& Safe&Share&allows&the&data&owner&to&revoke& access&to&any&file,&even&after&sharing& •& When&access&permissions&are&denied,& collaborators&will&no&longer&have&any&access&to& the&shared&file& 9.& Complete Mediation •& Safe&Share&performs&an&access&check&every& time&a&request&is&sent&to&decrypt&& a&secured&data&object& •& Safe&Share&requires&positive&verification&of& identity&every&time&a&user&request&is&made&& to&access&a&piece&of&data& 4.& Browser Cryptography •& Safe&Share&uniquely&provides&in9browser& encryption&whilst&maintaining&a&seamless&user& experience& •& Safe&Share&is&supported&by&all&major&browsers& 10.& Full Administrative Control •& Wide&breadth&of&controls&and&visibility&options:&& •& Manage&users,&files&and&permissions& •& Integrate&to&corporate&directories&using&LDAP,& whitelist&email&domains,&assign&labels,& customised&branding& •& Analytics&and&report&features& •& Manage&storage"a&plans& •& Internationalise&the&application&& within&Admin&console& 5.& End-to-End Encryption •& Data&is&encrypted&the&moment&it&is&uploaded& •& Data&remains&encrypted&in&all&applications,& however&it&travels&and&wherever&it&is&stored& •& Data&is¬&decrypted&until&it&reaches&the& intended&recipient& •& Data&designated&“view9only”&cannot&be& forwarded/re9shared&or&downloaded& ! 6.& Data Sovereignty •& Organisations&control&where&their&encryption& keys&are&stored:&on9premise,&in&the&cloud&or&in& a&trusted&data¢re&of&their&choice& •& Data&storage&and&sharing&protocols&are& determined&according&to&the&policies&set&by& organisations& •& Covata&gives&companies&control&over&where& their&data&is&stored& & & ©2015&Covata&Limited&its&affiliates.&All&Rights&Reserved.& & & & &&&&&& info@covata.com&|&covata.com&
Similar documents
Understanding Encryption and Cloud Security
If you have additional questions about IaC, compliance, governance and best practices when it comes to validating networks, be sure to contact the experts at prancer.
More information