- Right-to-Know Management
Data confidentiality and partitioning
- Protection of data across desktops, sharing and virtual environments
- Partitioning between users, service providers, work groups and departments.
- Very discreet and imposes no changes on user working habits.
ZONECENTRAL uses encryption to provide a confidentiality service applicable to all of an organisation’s files. It manages the right-to-know and protects sensitive data against external and internal access by partitioning information between users and departments as well as with IT operators.
Why use it?
Restrict file access to authorised users only
Data protection and segregation
Protecting sensitive data from loss and disclosure, as well as theft and espionage, is an imperative for businesses and government bodies.
To guarantee the confidentiality of its sensitive data across desktops, sharing and virtual environments, an organisation must be able to manage the right-to-know by ensuring that the information to be protected is only available to authorised persons.
Encryption is a technology perfectly suited to meet these requirements.
Confidentiality of the user’s extended environment
ZONECENTRAL encrypts the user’s extended environment: their local files and those located in personal folders on a network.
The solution therefore automatically applies cryptographic partitioning in accordance with the encryption policy defined by the organisation.
Files remain permanently encrypted, with only the user able to consult and read their content, without this having any impact on the IT services.
Partitioning on servers
ZONECENTRAL can automatically encrypt files from the user’s workstation when they are deposited on available network spaces (filers, NAS, etc.), respecting the cryptographic rights defined in these spaces by the security officers.
Management of the right-to-know is thus extended to encrypted shares and to the network extensions of users.
ZONECENTRAL provides partitioning between users, service providers, work groups or departments.
How does it work?
ZONECENTRAL key advantages
Light and non-structural solution
ZONECENTRAL does not require any changes to be made to the topography and organisation of storage facilities. Nor does it require additional hardware or servers (or installations on existing servers). Only installed on workstations, it is deployed like any other component of the security stack of the office software platform.
Corporate security governance
ZONECENTRAL automatically applies the company’s security policy. Users simply provide their access key when starting their work session, and the spaces they use are kept transparently encrypted according to predefined rules.
Furthermore, for shared zones, a supervision tool allows designated managers to manage the cryptographic accesses of user groups.
The teams in charge of security have the means to carry out recovery and troubleshooting (loss of keys, departure of an employee, audit, etc.).
No impact on the user experience
ZONECENTRAL remains highly discreet and imposes no changes on user working habits.
It applies the company’s security rules in the background, making it very transparent.
Our ZONECENTRAL use cases
Defense
Managing the Security Policies of workstations
A Major French Aeronautics and Defence Group
ZONECENTRAL
Aeronautic
Protecting Design and Commercial Secrets when on the Move
A Major Aeronautical Manufacturer looks to keep Industrial and Commercial Espionage at bay
CRYHOD
ZONECENTRAL
Labels and certifications
ZONECENTRAL obtained the following certifications:
COMMON CRITERIA CERTIFICATIONS AT LEVEL EAL3+
SECURITY VISA QUALIFICATION and QUALIFICATION STANDARD LEVEL FROM ANSSI
ENS ALTA CCN QUALIFICATION (SPAIN)
APPROVAL FOR PROTECTING INFORMATION AT THE LEVEL UE & OTAN RESTRICTED
Technical specifications
Windows 7 to 11+
AES 256 bit encryption
Access by RSA certificate/keys and/or password
Compatible with most market PKIs
Compatible with all types of file servers
(Windows, Linux, proprietary, etc.).
Compatible with all major PKCS#11 cryptoprocessor passes
(Smartcard or USB format)
You’re interested in this solution
Get a trial versionNeed more information?
Tell us more about your projectDiscover our other solutions
- Cloud
- Perimeter Security
- Right-to-Know Management
ORIZON : Confidentiality of documents in Microsoft 365
– Integrated with Teams, OneDrive and SharePoint
– Compatible the majority of EFSS on the market (OneDrive, Dropbox, etc.)
– Transparent for users
– Guaranteed sovereignty for the company
- Anti-theft
- Perimeter Security
CRYHOD : Drive encryption to protect against theft or loss
– Protection of computers while on the move or working from home,
– Full encryption of computers and drives, physical or virtual
– Authentication at start-up with all types of key
– "Encrypt and forget" solution