Secure file transfer via end-to-end encryption
Security and privacy issues regarding confidential data have been a hot topic the last few years. So the question how to secure company data for the upcoming years is one, which is going to appear on the agendas of many organizations. Many IT managers are already setting up their IT and security strategies for the upcoming years to ensure all departments within their organization are fully compliant on areas like data control, security and privacy.
Zero Knowledge: the AES key is generated on the user’s device and the private key of the recipient is not stored by us
Because of new risks the traditional security measures no longer meet the current required standard. This is why we have developed a new encryption method that ensures compliancy for now and the future.
The process is as following: files are encrypted on the local device of the sender with a symmetric key (AES key). To send the AES key safely to the recipient we protect this key using an asymmetric key pair (RSA key pair) that consists of a public and a private key. The recipient generates this RSA key pair. The public key is stored on our servers but only with the sole purpose of encrypting the AES key. The AES key is decrypted on the local device of the recipient via the private key.
So what makes end-to-end encryption so interesting for securing data (in the Cloud)?
By encrypting data end-to-end you prevent intermediaries, such as Internet providers or Cloud providers, to tamper with the content of your data. All data traveling between the two communicating parties is uninterrupted.
This means the encryption process is conducted on the local device of the sender and decrypted on the recipients device, without any involvement of third parties, giving you the assurance that data is only readable by the intended recipient.
We use three different channels to process the email message, the attachment and the encryption/decryption key, ensuring a safe transfer from sender to recipient