The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Comment pouvons-nous vous aider ? Vous trouverez l'aide qu'il vous faut.
S'enregistrer ou se connecter directement sur la plateforme Citadel Team
L'application est disponible sur toutes les plateformes.
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 11 juin 2015
We have become the mobile actors of a connected world, where objects are more and more ubiquitous in our daily life. From the moment we wake up until bedtime we browse and share, in a personal or professional way, most of the time in a permanent tangle of devices set up in BYOD (Bring Your Own Device), CYOD (Choose Your Own Device) or COPE (Corporate Owned, Personally Enabled)
mode, with an ever growing number of different used applications: about thirty applications a month per person. In a 1.3 billion devices global smartphone installed base, Intel McAfee’s last report on the threat status stresses that, within 2 years, aggregate active mobile phone malwares’ number has jumped from 1.5 million to over 6 million, with a spawning rate of roughly 250,000 per month! All users, even the experienced ones, have a natural tendency to trust their devices and applications that they think they know, developed by trustworthy and well known editors. Users heard of cryptography so they believe they do not risk anything. That’s clearly a mistake! Indeed, cryptography is not to blame in what is known as MITM (man in the middle) kind of attacks that build upon SSL/TLS loopholes, but rather the way keys and certificates attached to cyphering keys are managed. Similarly, when you ask a locksmith to craft a key, how could you be sure he wouldn’t make a copy of it and be able to open your doors, if it is not because your locksmith is granted and trustworthy? In the cyber world, it’s harder to picture the door but the approach should be the same, otherwise mobile handsets and information systems would end up infected by malware derived from vulnerability loopholes, such as the BERserk loophole. This loophole originates from a flaw in the RSA signatures verification process launched by mobile or non-mobile apps at secure connection establishment stage, or Heartbleed that affects the OpenSSL library implementation of SSL/TLS protocol. It allows an attacker to take over what seems to be secure connections between users and websites (cf. February 2015 McAfee’s Labs report). Thus, trust in keys and certificates management is essential! It will be discussed later on….
Cet article vous a plu ? N'hésitez pas à le partager