The trusted alternative to mass market instant messaging solutions
Boost communication by inviting thousands of members in dedicated chat rooms!
Comment pouvons-nous vous aider ? Vous trouverez l'aide qu'il vous faut.
S'enregistrer ou se connecter directement sur la plateforme Citadel Team
L'application est disponible sur toutes les plateformes.
Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption.
Cryptobox is the first secure sharing and collaboration solution to provide end-to-end data encryption, whether your device is a smartphone or a computer.
The digital transformation affects all businesses and organizations, from the smallest to the largest. This transformation brought about by technological developments offers many benefits:
To meet the new challenges of mobility and remote work, Ercom has developed Cryptosmart PC, a sovereign VPN solution to secure the connections of your remote Windows computers.
Cryptosmart is the only “Restricted” French & NATO certified solution, jointly developed with Samsung, to secure end-to-end mobile communications on consumer devices.
Cybels Hub DR, the first "Restricted" level accredited cloud solution to help inter-entity collaboration in a secure environment with partners! Collaborate in voice or videoconferencing, exchange data with your partners, all at the "Restricted Distribution" level, on a cloud operated and secured by Thales.
Posted 31 janvier 2023
Which VPN can you choose to protect your connections and sensitive data?
Remote work is a challenge for companies processing sensitive data. Hybrid work actually increases the attack surface, making it easier for cybercriminals to attack. As a result, 47% of remote workers have already been tricked by a phishing attempt.
Companies must secure all their connections, from and to every employee endpoint (PC, smartphone, tablet...) to allow them to navigate, communicate and exchange securely.
VPNs are an effective and indispensable protection measure against cyber-threats targeting connections. But not all VPNs offer the same level of security. So how do you choose a VPN adapted to your company's security challenges?
Cyber-threats targeting your connectionsThere are several forms of attacks that employees of a company can face while browsing the web and collaborating online. Here are some examples:
While these cyber-threats targeting connections are very common, they are only the tip of the iceberg. The diversity and sophistication of cyber-attacks increases every year.
Why should you choose a VPN solution and how?
VPNs (Virtual Private Networks) are a tool that aims to secure online browsing and data sharing. To do this, VPNs ensure communications are encrypted to protect data in case of interception. They allow you to connect to public networks without fearing for the security of your data. Of course, there are a myriad of VPN solutions on the market. So how do you choose one for your business? First, it is important to distinguish between VPNs for consumers and professional VPNs. Many consumer VPNs aim to mine and resell your data. 26 of the 117 most used VPN services collect their users’ data... Contrary to what their terms of use state.
On the other hand, professional VPNs are reliable solutions that ensure privacy.
We also recommend that you choose a sovereign VPN. American digital tools, including VPNs, are in fact required to hand over their customers’ data to the US justice system and federal agencies when requested to do so. Suspicions of economic espionage are therefore high towards this type of solution. It is therefore prudent to choose a French VPN, whose servers are based in France.
Certifications are another important criterion for organizations handling sensitive data. A VPN approved by ANSSI ensures a particularly demanding level of security is met.
Another important criterion is to choose a VPN that encrypts all communications (data, SMS, voice) to avoid any compromise. Furthermore, only your company should manage encryption keys: the VPN vendor itself should not have access to them.
Companies handling sensitive data must ensure their VPN cannot be corrupted. They must choose a VPN that gives them full control over the generation of keys for establishing secure connections.
Finally, it is important to know that a VPN installed alone on an unsecured phone may not offer sufficient security. It is important to use additional protections (antivirus, mobile threat defense, secure phone managed by the company, Mobile Device Management...) to secure your entire mobile fleet.
Of course, some VPNs offer advanced security features. This is the case of Cryptosmart PC and Cryptosmart Mobile, two VPN solutions that meet all the criteria listed above. These two solutions offer government-grade security, particularly with the installation of a gateway within the IS.
Our experts are available to discuss securing connections within your organization.
Cet article vous a plu ? N'hésitez pas à le partager