Summary
An IT security consultancy relies on CipherShare to bind its distributed consultants together.
Background
A consulting firm specializing in IT security, risk analysis and Public Key Infrastructure has strong motivation for securing internal communications, particularly when sharing information related to a client’s IT security infrastructure. The firm’s credibility rests on ensuring that this sensitive information remains confidential.
The firm’s consultants generally work out of their clients’ premises. When collaborating on large reports, consultants from across the country form ‘virtual teams’ to distribute the workload. These work groups required an effective tool for sharing information securely across organizational boundaries and perimeter security systems.
In addition, the firm wanted to assure clients that documents with sensitive information were distributed securely, and on a ‘need-to-know’ basis. The firm also wanted to ensure the confidentiality of information stored on servers and laptops was protected, and that each client’s information repository was segregated from that of other clients.
Finally, the firm’s reports are developed through an iterative process, where consultants with specialized knowledge provide input at various stages. To manage projects effectively, the firm required that all document modifications be tightly controlled, auditable and traceable.
For three years, the firm has relied on CipherShare to provide a fully-secured collaborative environment for its consultants. CipherShare’s sophisticated document management features provide check-in/check-out capabilities, an audit trail of modifications, and useful task management tools. Strong encryption protects client information while in transit, and while stored on servers and laptop computers. Granular access controls limit document distribution to those consultants with a ‘need to know,’ regardless of their location. Consultants share completed reports with clients securely through the CipherShare system.