Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech

Similar documents
FilesAnywhere Features List

How to Access Protected Health Information from Anywhere and Stay Compliant

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

SECURE DATA EXCHANGE

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

Vault. Vault. End User Guide END USER GUIDE. L o r e. (For Standard, Professional & Enterprise Editions)

Product Brief. Circles of Trust.

Introduction Secure Message Center (Webmail, Mobile & Visually Impaired) Webmail... 2 Mobile & Tablet... 4 Visually Impaired...

Box Competitive Sheet January 2014

Single Sign-On. Introduction. Feature Sheet

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

LastPass Enterprise Recommended Policies Guide

Cirius Secure Messaging Single Sign-On

Basic. $5/user per mo.

E-Share: Secure Large File Sharing

Security Camp 2016 Cloud Security. August 18, 2016

Single Sign-On. Introduction

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

Anchor Competitive Sheet May 2015

Secret Server Demo Outline

FTP-Stream Streaming Video Data Sheet

Five critical features

Storage Made Easy. Enterprise File Fabric for Unified Data Indexing, Auditing, e-compliance, and secure file sharing.

Oracle Data Cloud ( ODC ) Inbound Security Policies

E-Share: Secure Large File Sharing

Storgrid Data Sheet Enterprise File Serving Software re-invented

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

Security PGP / Pretty Good Privacy. SANOGXXX July, 2017 Gurgaon, Haryana, India

BUSINESS CLOUD FAX By Northland Communications

User Manual of Webmail Version 5

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

CPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Export out report results in multiple formats like PDF, Excel, Print, , etc.

User Guide. Version R94. English

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet

Exchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011

Evaluating Encryption Products

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

Introduction. The Safe-T Solution

Account Restrictions Agreement [ARA] Required by LuxSci HIPAA Accounts

CipherPost Pro Enterprise Dedicated Cloud

Secure Messaging Large File Sharing

The Device Has Left the Building

Top. Reasons Legal Teams Select kiteworks by Accellion

Improving Password Management. Laura Raderman, Policy and Compliance Coordinator, ISO Ole Villadsen, Research Liaison, Cybersecurity, UL

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

DocAve Online 3. User Guide. Service Pack 17, Cumulative Update 2

Security in Bomgar Remote Support

GRS Enterprise Synchronization Tool

MDaemon Vs. MailEnable Enterprise Premium

Release Notes October 2016

Secure Messaging is far more than traditional encryption.

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle

Storage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3

Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release

User Guide. Version R92. English

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Cirius Secure Messaging Enterprise Dedicated Cloud

Control access to your super user accounts

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents

PRODUCT SHEET. LookAt Technologies LTD

Keeping Important Data Safe and Secure Online. Norm Kaufman

PCI DSS Compliance. White Paper Parallels Remote Application Server

HikCentral V.1.1.x for Windows Hardening Guide

Colligo Briefcase. for Good Technology. Administrator Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

CipherMail encryption. CipherMail white paper

Acronis Data Cloud Version 7.8

In-Depth Guide to PaperVision Enterprise

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

REACH Remote Deposit Capture

Storage Made Easy. Mirantis

esign Genie Quick Start Guide

What Dropbox Can t Do For Your Business

USER S MANUAL. TryBooking Salesforce Integration Page 2

Sync User Guide. Powered by Axient Anchor

Workspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide

How Managed File Transfer Addresses HIPAA Requirements for ephi

Storage Made Easy. SoftLayer

Egress Switch Desktop Client

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

User Guide. BlackBerry Workspaces for Windows. Version 5.5

SmarterMail Edition Comparison

IBM Tivoli Identity Manager V5.1 Fundamentals

MDaemon Vs. Zimbra Network Edition Professional

DocuSign for Salesforce User Guide v6.1.1 Published: July 10, 2015

Secure Services 2018

MDaemon Vs. Kerio Connect

Workshare Desktop App. User Guide

TIS/App Delivery Mobility Job Aid: Install and Configure Microsoft Outlook on Your Android Phone. Overview. Job Aid: Outlook for Mobile - Android

User Guide. Admin Guide. r

Providing an Enterprise File Share and Sync Solution for

User Guide. Version 8.0

SureClose Product Line

TIS/App Delivery Mobility Job Aid: Install and Configure Microsoft Outlook on Your iphone. Overview. Job Aid: Outlook for Mobile - iphone

TECHNICAL WHITE PAPER. Secure messaging in Office 365: Four key considerations

Transcription:

Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech

Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities in compliance and information security policies. The infiltration of these services into the business process has been driven by their consumer-led ease of use. The downside of this is the rudimentary central controls available and associated consumer branding, even on the Professional service offers. Solution Quatrix is professional, secure and easy to use file sharing. Quatrix by Maytech provides a simple one-step web based file sharing for end users with enterprise level controls, empowering IT to enforce compliance, data protection and information security policies through granular administrative controls and a full audit trail. Quatrix is also white labelled to fully integrate with your brand and corporate identity. Files are securely shared over HTTPS and protected at rest using AES-256 encryption which is suitable for most business workflows. In addition, there is a unique user friendly PGP encryption feature which provides advanced security for highly confidential data. This is disabled as a default setting but can be enabled as a global setting by the account administrator. For more information on our PGP encryption feature please see the relevant section at the end of this document. Key Features 2

Key Features Central provisioning and strong administrative controls including multi-factor authentication (MFA) Comprehensive tracking for users and admins shows both historic and in progress shares with full details of recipients, files shared and download status with opportunity to export tracking logs into CSV Automatic deletes with custom reports Strong passwords policy for enhanced security Encryption over HTTPS or SFTP and AES-256 encryption at rest Optional PGP public key encryption provides advanced security Antivirus scan of all file uploads Unique data acquisition functionality through the share to me and request files features Shared folders Easy drag and drop file sharing White labelled to match your corporate branding Outlook Plug-in Quatrix Drive with Desktop sync (coming soon) Sharing Files Sharing files through Quatrix is easy through the share form. Drag and drop from the desktop or cloud storage to share files or folders, it s as easy as sending an email. Users can define optional settings for the share: password protection, release and expiry dates, notification on download and include a share to me link for the recipient to return files. Quatrix Share Form 3

Receiving Files Quatrix can also be used to return files to the sender through a secure, branded interface. Using the return to me feature, files can be shared with a link for files to be returned through (useful for document approval/ documents for signature etc). Or using the request files feature to send a link for files to be uploaded through securely. Administrative Functions The administrator adds and manages Quatrix users and controls account-wide settings which include: Form and message branding Editor to add a universal message footer/disclaimer text Create a hidden BCC field for all messages Billing permissions Central tracking for all Quatrix activity across all users with opportunity to export tracking logs into CSV Central share controls: public, tracked and restricted Mass users create and edit Auto delete rules with reports Multiple admins in a single account Global and per user language settings 4

Key Benefits For End Users For IT Easy one-step file sharing Send files of any size Built-in address book Set release and expiry dates Password protect files Notifications on download Generate and send links to acquire files from external contacts Personal tracking - a comprehensive history showing full detail on all files shared, downloaded and acquired Revoke shared files Project folders Access via SFTP Multi-factor authentication Secure cloud vault Users and contacts classification Files Previews Quick to provision, integrate and scale. Rapid enduser adoption and acceptance Underpinned by full enterprise security features Data is encrypted in transit with HTTPS and at rest with AES-256 bit encryption as standard Convenient multiple users properties create and edit Automatic files delete rules with configurable scheduled automatic reports Comprehensive logs and tracking for all user activity with opportunity to export tracking logs into CSV file Central control over: Password policies Branding and integration Compliance/disclaimer email footers PGP encryption for highly sensitive files Data tokenisation 24/7 phone and email support Virus scan for file uploads Integrations with YouTube, Oracle, Mulesoft API Why PGP? AES-256 is the industry standard level of encryption for data at rest and uses a single key to encrypt and decrypt your data. This level of encryption is sufficient for most business workflows. PGP (Pretty Good Privacy) is a higher level of encryption that ensures that no one but the intended recipient is able to access your data, making it suitable if you re sharing highly sensitive data. It uses one key to encrypt the file (the public key) and another to decrypt (the private key) which traditionally makes it much more cumbersome to use than standard levels of encryption. With Quatrix PGP is uniquely built it into the browser to add an enhanced level of end-to-end security with the ease of use of a single click. Putting it simply, encrypting files is like locking them in a chest. AES-256 uses the same key to lock and unlock the chest and PGP uses two keys. 5