The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Comment pouvons-nous vous aider ? Vous trouverez l'aide qu'il vous faut.
S'enregistrer ou se connecter directement sur la plateforme Citadel Team
L'application est disponible sur toutes les plateformes.
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 18 avril 2016
The last report published by Intel Security titled “McAfee Labs Threat Predictions Report”, is not very optimistic about the evolution of IT threats that companies would have to tackle for the next three years. One of the answers to these threats, presented by the IT security industry, is data encryption and more specifically what is known as end-to-end encryption. Yet, given the multiple ambiguous options to choose from, it’s important to precisely define what is end-to-end encryption.
In a standard end-to-end encryption process*, data are encrypted as soon as they leave a terminal, they remain encrypted through all transit nodes: data are then “scrambled”, which means protected. It’s then not important where they are transiting: confidentiality and integrity are preserved. Depending on the context, encryption can be packet-based, such as in telecommunication systems, or file-based. In both cases, confidentiality of encrypted material is preserved regardless of the transit networks and systems.
End-to-end encryption is very strong when performed properly and offers incomparable levels of security, since it is independent from intermediate systems. However, using this process should be studied on a case-specific basis. Thus, web-oriented applications are genuinely hard to adapt to this conception**. Similarly, content-based search becomes more complex.
Nowadays, an inappropriate use of the words end-to-end encryption is spreading, which is considering data to be encrypted at any moment while it’s not in a continuous way. In fact, those who offer these solutions omit to state that at some point, in machine memory, data is no longer encrypted. But, not considering memory, which has received the data, as a transit point is a big mistake on end-to-end encryption’s concept. Some file sharing web-services add security layers at some point of their processes (link encryption, data storage, sometimes memory, etc.) but not end-to-end, to be able to use server data for commercial analytics (indexing, search, etc.). The confusion, leveraged by some unprincipled commercial parties, is to make users believe that: “transit encryption” + “standstill encryption” = “end-to-end encryption”. It is wrong! In that kind of option where marketing and security are mixed, an important amount of trust is necessary for the data-storage provider and intermediaries…
* The real definition: https://en.wikipedia.org/wiki/End-to-end_encryption
Cet article vous a plu ? N'hésitez pas à le partager