how one to one sharing enforces secure collaboration - xonom

14
Connect Security World Conference Sept. 17 2015 Laurent Henocque - KeeeX - Marseille How One to One Sharing Enforces Secure Collaboration

Upload: laurent-henocque

Post on 21-Jan-2018

1.053 views

Category:

Presentations & Public Speaking


0 download

TRANSCRIPT

Page 1: How One to One Sharing Enforces Secure Collaboration - xonom

Connect Security World Conference Sept. 17 2015

Laurent Henocque - KeeeX - Marseille

How One to One Sharing Enforces Secure Collaboration

Page 2: How One to One Sharing Enforces Secure Collaboration - xonom

The situation

‣ Cloud and sharing solutions abound, but do not make our life easier

‣ Collaborating over heterogeneous clouds or systems is impossible in confidentiality

‣ Group and Access right management turns to a nightmare

‣ External collaboration requires even more care

2

Page 3: How One to One Sharing Enforces Secure Collaboration - xonom

How do your contacts share?

Page 4: How One to One Sharing Enforces Secure Collaboration - xonom

The group management nightmare

‣ External collaborators must be invited to use, and maybe pay

‣ It must be decided if a new collaborator can access the group history - or create a new group

‣ External collaborators may have their own conflicting cloud and preferences

‣ Some admins end up managing some 900+ groups

4

Page 5: How One to One Sharing Enforces Secure Collaboration - xonom

So, what happens?

‣ External collaborators (lawyers, accountants, customers, sub-contractors…) often receive unprotected documents.

‣ Internal collaborators deploy a wealth of Shadow IT, and send home documents via their dropbox or the like.

5

Page 6: How One to One Sharing Enforces Secure Collaboration - xonom

approval

previous

reference

initialfinal

Good news: file organization and management can be embedded

tag...

report

So: no tier is required to manage file organization, and files may travel anywhere

Page 7: How One to One Sharing Enforces Secure Collaboration - xonom

Cloud Sync folders, NFS+VPN drives can be used as transfer tunnels

Encryption is local

Cloud/Disk…

Folders act as tunnels

Page 8: How One to One Sharing Enforces Secure Collaboration - xonom

An app can memorize per user sharing mode and encryption settings

Page 9: How One to One Sharing Enforces Secure Collaboration - xonom

We don’t need groups

‣ Initial sharing list for a document can be used as a default for all subsequent versions, and comments, and any relevant activity…

‣ A new user can be added to a document without revealing the previous activity

‣ Encryption is the de facto default over insecure media

‣ Heterogeneous sharing is a no brainer 9

Page 10: How One to One Sharing Enforces Secure Collaboration - xonom

Example Version 1

Page 11: How One to One Sharing Enforces Secure Collaboration - xonom

Version 2: same sharing list

Page 12: How One to One Sharing Enforces Secure Collaboration - xonom

Preparing version 3: suggested sharing list - heterogeneous modes

DropboxWeblinks

Page 13: How One to One Sharing Enforces Secure Collaboration - xonom

Conclusion

‣ One to One encryption and sharing settings can be memorized by an app

‣ Encrypted files may transit via any cloud tunnel while carrying all organizational, integrity, authenticity and semantic information

‣ People can use the clouds of their choice

‣ Adding recipients to a sharing list is instantaneous

‣ Security is never compromised

13

Page 14: How One to One Sharing Enforces Secure Collaboration - xonom

14

Thanks for listening

Meet us at World Smart WeeeK

Laurent Henocque, [email protected], +33 683 88 20 01

KeeeX SAS, RCS Marseille 807 570 148Pôle Média Belle de Mai CS 20038 – 37 Rue Guibal – 13356 Marseille cedex 03

Tel: +33 4 91 05 64 47