Fully integratable

Archiving of data is demanded by numerous laws and regulations, above all by GDPR. The Cryptshare archiving and DMS interface allows you to work with your existing archiving and document management systems.

All data that is transferred via Cryptshare - inbound and outbound files and messages - can be handed over to your archiving or DMS system in plain text and stored or processed there.

The transmission can be done via Secure Copy Protocol (SCP). The protocol ensures the confidentialityintegrity and authenticity of the transmitted data. The interface can be implemented easily and quickly and thus guarantees smooth data processing. 

 

 

How the Cryptshare Archiving Interface works

The Cryptshare archiving interface allows the administrator to define a location on a file system, either on any other server that is reachable via the network by the Cryptshare Server (recommended) or directly on the Cryptshare Server (not recommended). To connect to this file system location, you can use Secure Copy Protocol (SCP) or a file system connector (e.g. map a drive on the local or a remote computer via the operating system).

Information that is uploaded by the users to the Cryptshare Server will be copied to that file system location after it has been completely uploaded and scanned for malware, but before it is being stored encrypted. 

Each transfer will be located in a sub-directory using the unique Transaction ID of the transfer as directory name.

You can configure your existing archiving solution to import and archive the files from the location that Cryptshare has placed them into. Depending on the configuration, either the archiving system or Cryptshare will delete the archived files from there after processing. This interface could also be used for other applications processing files such as document management systems (DMS). If you do not have an archiving solution that can automatically load files from a file system, you might use the file storage location itself as a simple archive.

Data integrity – be in control of your data

For each incoming and outgoing message or file, a checksum is created by the system using the SHA-1 hash algorithm. Each checksum is stored in the log of the Cryptshare server and in your archive. The checksum is unique for any particular text or file. If a recipient changes only a single bit in a file that was received from the Cryptshare Server the checksum changes as well.

With the help of the data stored in the log such as time of dispatch, sender, recipient you can determine if, when and to whom a file such as an invoice for instance or a confirmation of an order was sent. Using the checksums of the documents, you can now even check if the files are identical on both the sender and the recipient side and whether the recipient is holding the very document

in his hands that was initially transferred via Cryptshare. If the checksums are not identical then the document may have been tampered with or it is a different document. This function reinforces the level of security in companies because users can clearly prove or disprove the integrity of transmitted documents.

What about your e-mail encryption or EFSS solution?

Are they capable of doing the same?!

Powerful

Small or big – Cryptshare Archiving Interface works perfectly with most archiving solutions, manages all data sizes and helps you to be in control of your data.

Priceless

Keeping your data in order in a secure place will not only save you money but a hell of a lot of time and nerves.

Easy

Easy implementation guarantees smooth data processing - Archiving data has never been easier!

Get to know Cryptshare

and see for yourself!

You would like to have a presentation?

Join one of our webinars!