Secure data transmission. How to do without “clouds”?

Flattr this!

Companies today are becoming more decentralized, competition intensifies. The faster a company responds to changes in the competitive environment, the more flexible it is working with the end users. Every business has a lot of contractors, firms, partners, clients who need to share information, including confidential.

Users from different countries and organizations can work in one structure, so for the exchange of information, they need secure IT tools. Before the company aim to ensure the safe transfer, monitoring, and managing growing volumes of data.
With all the variety of proposed solutions on the market the most common and relevant way communication is e-mail. However, its use imposes certain restrictions, such as a limit on the amount of information transmitted is not always better means of protection, the inability to cancel the action, the danger of sending information to the wrong address, etc. In addition, the traditional e-mail and can even be organized without the standard means serious investments, but still requires constant support and substantial effort.

Another equally popular method of communication is the FTP-server. But the manual loading / unloading, minimal opportunities for the allocation of rights are also disadvantages in terms of modern realities.

It would seem that cloud technology can solve the problem of public access and resource management. The main players in the market for quite some time offer tools to store and work in the cloud and successfully monetize them. However, cloud storage has traditionally not credible. No one wants to convey important (including critical) information to third parties, and while working in the “cloud” there are problems with version control dynamically change the content to be accessed by multiple people simultaneously.

The software solution Mflash

The German company Secure Pack has taken into account all of the above problem by transferring files and developed an interesting product: hybrid cloud services and tools for administration of access.

What is the main difference? “Cloud” organized by the owner of files. There is no need to transfer data to third-party operators, if you can self-organize the resource to which access is strictly regulated according to the objectives and needs of the customer.

If you need to transfer large amounts of data, which can not send e-mail – a plug-in for MS Outlook automatically detects the amount in excess of the permitted for shipment, load the file in the repository, and insert a link to it in writing. This will eliminate the need for file-sharing resources, some of which may be of questionable reputation.

Mflash can use the solution for a wide variety of tasks. We list and describe some of them.

Daily synchronization of multiple documents. Example, an employee creates documents that are then sends the seller’s responsibility. This is a list of actions. Mflash allows you to synchronize the specified folder or files automatically become available to users who have the appropriate access. Moreover, the possibility of automatically notifying users by email when you change a file / s.

Single file transfer. Often necessary to send a file to third parties without the risk that he would go to the wrong address. To do this, the time reference is generated, which will have attributes such as number of downloads, and download time. Additionally, you can include the option to delete a file and / or notification of completion of the download.

Protection is provided by the data link 2048-bit key encryption, and simple plug-in (in JAVA) for the browser does not require users any special skills or additional training.

It is obvious that this method of communication, even if provided in-house (not transferable) requires additional monitoring. This provides integration with DLP-systems, which will automatically control the active channel.

You can back up your files to the server, which minimizes the risk of loss, and the web administration interface allows you to quickly make changes to the configuration.

Moreover, all of the changes and the process of allowing access to the files are written to the log, which can be accessed in case of need to get a report on completed actions.

Files and directories can be transmitted to the external network will be included in the rules for handling confidential information, thereby DLP-IRM-system and can provide additional protection against leakage when dealing with confidential data.

Usage Scenarios

Let’s say the company has created a group to draft a brochure design that caught by officers on outsourcing (subcontracting). In the traditional approach to the organization of work (after all, all participants must have access to the project), the working group will face a huge amount of information forwarded by mail, the inability to exchange large files, as well as the problem of timely control of the version of the file, as all participants will be required to constantly share information with each other. What to do?

Applying decision Mflash employees will be able to avoid problems with versioning and a large number of documents, will receive a single workspace, which is easily controlled with the rules of access and will be able to connect an external subcontractor to perform work without giving him access to the grid and not having to worry about the possible leaking inside information to third parties.

Another situation. For example, in a small company it is time for the billing contractors. Many accounts, they have to send their customers responsible for the sales staff. Because the company is small, many are working remotely, without coming into the office – it is a normal practice in the modern world. Creating folders for specific users and accounts placing files there when they are ready, the staff of accounting will be spared the constant transmission of documents – managers themselves will download them from the general area to which access is only from them.
Sending a large attachment in a letter becomes a problem. Solve it, usually resorting to shared storage (for example, Yandex.Disk, depositfiles, etc.). When using MFlash company can itself create the file store for the safety of which she can be at peace, because servers will be physically located either at the office or in rented by the data center, without the possibility of unauthorized access. In the case of file storage from a third party, no one can guarantee them immunity from hacking, hacking or DDoS-attacks.

What the client finally gets?

The solution enables you to quickly and without much effort to close such problems for employees of departments of IT and IS as:
– Secure data transfer without the participation of third parties;
– Flexible tools to configure access rights, the fixation of the crimes;
– The removal of restrictions on the volume of data transmitted without;
– Organization of the total, controlled safety systems of work space for employees and contractors.

The simplicity and ease of administration to optimize the process of introducing the product Mflash. This means that begin using the customer will be able to quickly, without hassle and effort.

Tagged ,