What is the right approach to protect electronic communication?
...their traditional email soon reached its limits. Large amounts of data were routinely burned on CDs or stored on USB sticks and then sent off. Confidential data often had to be sent by post or fax. That was awkward and costly. In addition, the communication partner receiving the documents exclusively in analog form and could not simply process them digitally....
We talk about your individual challenges! For secure digital communication with applicants and employees when sensitive information is involved. Optimise sales through secure and traceable communication. Protect your know-how against industrial espionage and easily handle the exchange of large files...
Your instant access to expert knowledge. For your research or presentation to stakeholders. Collection of current and helpful topics: Secure email and sending large files in the digital world of tomorrow.
Cryptshare Web App
Large or sensitive files via browser app? Request and send them quickly, easily and at any time.
Cryptshare for Outlook
Your files - large or sensitive. Send simply and securely with Outlook.
Cryptshare for Notes
Your files - large or sensitive. Send simply and securely with Notes.
Cryptshare API and Automation
The security upgrade for your IT systems. Integrated transport service for digital information - fast and secure.
You are the focus at all times. Whether it's testing, FAQs, documentation in the Cryptshare WIKI or in-house product support. You get more than just software.
With Cryptshare, you are choosing a manufacturer that focuses on cooperation with your IT service providers. Whether it's operation, acquisition or deeper system integration, we live and breathe partner business.
Whether you are a small professional firm, a mid sized engineering company or a global enterprise. Cryptshare scales with you.
Requires management of user accounts and may be a graveyard for data.
Once set up and running an FTP server is relatively cheap to run but they will most often occupy a member of your staff for some time to build and manage. Transaction costs are low but access may be complicated so user set-up and support will take time.
In house FTP servers are not secure. User access controls are frequently rudimentary and it is common to find large amounts of legacy data on older ftp servers which have not been purged, however they have the benefit of being inside your DMZ.
Large files may be handled by ftp servers, but controlled availability data integrity and user authentication are weaknesses and the concepts of non-repudiation are handled poorly. Some level of audit trail is possible.
For non-technical users ftp services are un-popular and with security being especially low outside the DMZ services based on ftp are sporadic in use. However relative ease of access and lower authentication hurdles mean that they are easy to use.
Complex to use, time-consuming to set up and operate. May conflict with other infrastructure.
More expensive than regular FTP and more complex to install and create SFTP can place a very large burden on your corporate IT infrastructure and on IT staff to install administer and manage. The need for user accounts and administration add to the costs.
Bringing encryption in transit and in storage provides short term security but often poor long term management of the data store. SFTP does have the benefit of running inside the firewall and being locally administered offers some configurability. In the long term SFTP solutions tend to be updated infrequently and are vulnerable to current threats.
SFTP services are rarely certified but they have some advantages, high security, clear process inclusion often policy driven and a clear audit trail. Against this is the problem of ad hoc usage and management which can place barriers to use.
Requiring a client installation SFTP takes time to set up and some level of training before it can be used. For the client end it is more complex to use than SFTP and policy creation is complex. Back to overview Learn now how to transfer files using Cryptshare.