What is the right approach to protect electronic communication?
...their traditional email soon reached its limits. Large amounts of data were routinely burned on CDs or stored on USB sticks and then sent off. Confidential data often had to be sent by post or fax. That was awkward and costly. In addition, the communication partner receiving the documents exclusively in analog form and could not simply process them digitally....
We talk about your individual challenges! For secure digital communication with applicants and employees when sensitive information is involved. Optimise sales through secure and traceable communication. Protect your know-how against industrial espionage and easily handle the exchange of large files...
Your instant access to expert knowledge. For your research or presentation to stakeholders. Collection of current and helpful topics: Secure email and sending large files in the digital world of tomorrow.
The security upgrade for your IT systems. Integrated transport service for digital information - fast and secure.
You are the focus at all times. Whether it's testing, FAQs, documentation in the Cryptshare WIKI or in-house product support. You get more than just software.
With Cryptshare, you are choosing a manufacturer that focuses on cooperation with your IT service providers. Whether it's operation, acquisition or deeper system integration, we live and breathe partner business.
Whether you are a small professional firm, a mid sized engineering company or a global enterprise. Cryptshare scales with you.
Why end-to-end encryption (E2EE) is not usually the medium of choice in organisations.
My thoughts on end-to-end encryptionTobias Burkart, Senior BDM, Cryptshare
Again and again I am asked whether Cryptshare can also encrypt end-to-end. In such instances, I always ask the counterquestion: What exactly is meant by this? For me, end-to-end encryption actually refers to the end of the communication chain, meaning from client to client.
Why this often turns out not to be useful in practice, the questioners can commonly answer me themselves:
If the transfer from the sender to the digital inbox of the receiving company (analogue: reception/HQ/post office) is secured, internal distribution can then be realised at the receiving company via their existing infrastructure.
Often, users on the receiving side don‘t want to have to use additional software but would rather like to be allowed to maintain their familiar processes.
Very low operating costs, as the system is centrally managed and you do not have to go back to individual client management, sparing the TCO.
Using the already existing IT security infrastructure on both sides (mail gateway, firewall, content and malware scanning, DLP, etc.), in which a lot of money has been invested, instead of cancelling this by using end-to-end. This is userfriendly and creates acceptance among staff.
The possibility of the information on both sides to be archived or transferred directly and automated into a central document management system. This leads to an ideal further processing for the user, instead of creating hurdles it accelerates communication.
The communication works for external contacts with the onboard resources of their systems and requires no software installation and certificate management. Therefore, communication between people is enabled instead of prevented.
In end-to-end encryption (E2EE), information is encrypted and decrypted directly at the communication partners. For example, a file is encrypted at the sender before it is transmitted. The nodes involved in the transmission (such as service providers) cannot access the encrypted information, but can only determine the sender and recipient information that is necessary for the delivery of the file. Decryption then only takes place after transmission on the recipient side.
Cryptographic procedures are used for encryption and decryption. For example, symmetrical or asymmetrical encryption with public keys and private keys.
The concept of end-to-end encryption is considered very secure and reliably protects information from unwanted access by third parties. Nevertheless, this also results in some practical disadvantages, which we address on this page.
The key to securing
What is email and why do we rely on it so much?
Solving the problems that need to be solved, no more no less; 10 practical considerations for a successful email encryption project. Or... `Help your CFO to love Cryptshare!´