Cloud Storage Security Layers

-A +A

Scope

  • Security services and applications that offer a secure and encrypted data transfer from clients to cloud storage systems.
  • Due to end-to-end encryption, compliance with the law on protection of personal data no. 6698
  • System Context:
    • Cloud infrastructure
    • Micro services on cloud
    • Desktop, web and mobile applications
  • Goals:
    • Providing data privacy by storing it encrypted on cloud
    • Performing a secure data transfer from client to cloud due to end-to-end encryption
    • Secure data sharing
    • Access control

Explanation

Functionality:

  • Easy install and use
  • Synchronization of folders
  • Recovery of older versions
  • Activity history
  • Compliance with the law on protection of personal data no. 6698

Security:

  • End-to-end encryption
  • Zero-knowledge authentication
  • Password-protected shared links
  • Two-factor authentication
  • Security policies
  • Access control

Enterprise:

  • File sharing with password-protected shared links
  • File control on team level
  • Audit & logging according to the law no. 5651
  • Secure file sharing
  • Administration UI

Platform/Client:

  • Microsoft Windows, Linux
  • Android, IOS, Windows Mobile
  • Google Chrome, Mozilla Firefox,
  • Internet Explorer, Microsoft Edge, Safari

Acquisitions

  • Locally customized and nationally adapted technology
  • End-to-end secure file storage and sharing
  • Secure access to data from any environment
  • Cloud computing and micro services security