Sharing the Burden The one with Plenty Helping the One in Need.
How One to One Sharing Enforces Secure Collaboration - xonom
-
Upload
laurent-henocque -
Category
Presentations & Public Speaking
-
view
1.056 -
download
0
Transcript of How One to One Sharing Enforces Secure Collaboration - xonom
![Page 1: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/1.jpg)
Connect Security World Conference Sept. 17 2015
Laurent Henocque - KeeeX - Marseille
How One to One Sharing Enforces Secure Collaboration
![Page 2: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/2.jpg)
The situation
‣ Cloud and sharing solutions abound, but do not make our life easier
‣ Collaborating over heterogeneous clouds or systems is impossible in confidentiality
‣ Group and Access right management turns to a nightmare
‣ External collaboration requires even more care
2
![Page 3: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/3.jpg)
How do your contacts share?
![Page 4: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/4.jpg)
The group management nightmare
‣ External collaborators must be invited to use, and maybe pay
‣ It must be decided if a new collaborator can access the group history - or create a new group
‣ External collaborators may have their own conflicting cloud and preferences
‣ Some admins end up managing some 900+ groups
4
![Page 5: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/5.jpg)
So, what happens?
‣ External collaborators (lawyers, accountants, customers, sub-contractors…) often receive unprotected documents.
‣ Internal collaborators deploy a wealth of Shadow IT, and send home documents via their dropbox or the like.
5
![Page 6: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/6.jpg)
approval
previous
reference
initialfinal
Good news: file organization and management can be embedded
tag...
report
So: no tier is required to manage file organization, and files may travel anywhere
![Page 7: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/7.jpg)
Cloud Sync folders, NFS+VPN drives can be used as transfer tunnels
Encryption is local
Cloud/Disk…
Folders act as tunnels
![Page 8: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/8.jpg)
An app can memorize per user sharing mode and encryption settings
…
![Page 9: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/9.jpg)
We don’t need groups
‣ Initial sharing list for a document can be used as a default for all subsequent versions, and comments, and any relevant activity…
‣ A new user can be added to a document without revealing the previous activity
‣ Encryption is the de facto default over insecure media
‣ Heterogeneous sharing is a no brainer 9
![Page 10: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/10.jpg)
Example Version 1
![Page 11: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/11.jpg)
Version 2: same sharing list
![Page 12: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/12.jpg)
Preparing version 3: suggested sharing list - heterogeneous modes
DropboxWeblinks
![Page 13: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/13.jpg)
Conclusion
‣ One to One encryption and sharing settings can be memorized by an app
‣ Encrypted files may transit via any cloud tunnel while carrying all organizational, integrity, authenticity and semantic information
‣ People can use the clouds of their choice
‣ Adding recipients to a sharing list is instantaneous
‣ Security is never compromised
13
![Page 14: How One to One Sharing Enforces Secure Collaboration - xonom](https://reader033.fdocuments.net/reader033/viewer/2022050614/58ef5f941a28aba9798b469b/html5/thumbnails/14.jpg)
14
Thanks for listening
Meet us at World Smart WeeeK
Laurent Henocque, [email protected], +33 683 88 20 01
KeeeX SAS, RCS Marseille 807 570 148Pôle Média Belle de Mai CS 20038 – 37 Rue Guibal – 13356 Marseille cedex 03
Tel: +33 4 91 05 64 47