Data Encryption Solution
Every business needs to send and receive emails, and likewise the need to share documents is paramount. But when those communcations are confidential – such as when they contain personal data – you need a mechanism to protect them.
Take this seemingly straighftforward use-case: You receive a Subject Access Request from a customer or ex-employee wanting to know what data you’re holding on them. Hopefully you’ll have your processes in place to gather the data, but first off you’re going to have to establish the credentials of the person requesting the information. Typically that will involve checks of some form of ID, such as a passport, driving licence, or Utility bill. The last thing you want is for that sensitive personal data to be breached as a result of sharing it with you. You need encrypted data transmission.
Having got through the identification stage, and then collected all the information to respond to the SAR, how are you going to share it all, without risking a further breach? You need encrypted data sharing.
But there are plenty of solutions out there to address this problem – right? Yes, but they usually require wholescale changes to your IT infrastructure, and so become prohibitive to establish. Our solution sits alongside your current IT set up, and – importantly – is easy to set up and administer.
Traditional e-mail has the confidentiality level of a postcard. Any actor involved in its transport can easily read it. Encrypted email offers a way to transform emails into a confidential and auditable electronic letter.
Our solution uses advanced technology which ensures the message is shared via secured electronic encrypted means and guarantees only the recipient can access the information. It doesn’t require integration with existing software and you could be up and running in minutes.
Making documents available to a group of users with all revisions of these documents, is a key task of projects and business processes of any kind.
Our solution enables the secure sharing and storage of sensitive information with an audit trail. One of the most criticised facts about cloud services is the lack of security of stored data. In order to make sure that your data is always secured, our solution does the encryption and decryption on the fly so that the service provider, who hosts the data, is not even able to see your files.