• Right-to-Know Management

Data confidentiality and partitioning

- Protection of data across desktops, sharing and virtual environments
- Partitioning between users, service providers, work groups and departments.
- Very discreet and imposes no changes on user working habits.

logo ZONECENTRAL, confidentiality and partitioning

ZONECENTRAL uses encryption to provide a confidentiality service applicable to all of an organisation’s files. It manages the right-to-know and protects sensitive data against external and internal access by partitioning information between users and departments as well as with IT operators.

Why use it?

Restrict file access to authorised users only

Data protection and segregation

Protecting sensitive data from loss and disclosure, as well as theft and espionage, is an imperative for businesses and government bodies.

To guarantee the confidentiality of its sensitive data across desktops, sharing and virtual environments, an organisation must be able to manage the right-to-know by ensuring that the information to be protected is only available to authorised persons.

Encryption is a technology perfectly suited to meet these requirements.

Confidentiality of the user’s extended environment

ZONECENTRAL encrypts the user’s extended environment: their local files and those located in personal folders on a network.
The solution therefore automatically applies cryptographic partitioning in accordance with the encryption policy defined by the organisation.

Files remain permanently encrypted, with only the user able to consult and read their content, without this having any impact on the IT services.

Partitioning on servers

ZONECENTRAL can automatically encrypt files from the user’s workstation when they are deposited on available network spaces (filers, NAS, etc.), respecting the cryptographic rights defined in these spaces by the security officers.

Management of the right-to-know is thus extended to encrypted shares and to the network extensions of users.

ZONECENTRAL provides partitioning between users, service providers, work groups or departments.

How does it work?

ZONECENTRAL key advantages

Light and non-structural solution

ZONECENTRAL does not require any changes to be made to the topography and organisation of storage facilities. Nor does it require additional hardware or servers (or installations on existing servers). Only installed on workstations, it is deployed like any other component of the security stack of the office software platform.

Corporate security governance

ZONECENTRAL automatically applies the company’s security policy. Users simply provide their access key when starting their work session, and the spaces they use are kept transparently encrypted according to predefined rules.
Furthermore, for shared zones, a supervision tool allows designated managers to manage the cryptographic accesses of user groups.
The teams in charge of security have the means to carry out recovery and troubleshooting (loss of keys, departure of an employee, audit, etc.).

No impact on the user experience

ZONECENTRAL remains highly discreet and imposes no changes on user working habits.
It applies the company’s security rules in the background, making it very transparent.

Labels and certifications

ZONECENTRAL obtained the following certifications:

COMMON CRITERIA CERTIFICATIONS AT LEVEL EAL3+

SECURITY VISA QUALIFICATION and QUALIFICATION STANDARD LEVEL FROM ANSSI

ENS ALTA CCN QUALIFICATION (SPAIN)

APPROVAL FOR PROTECTING INFORMATION AT THE LEVEL UE & OTAN RESTRICTED

Technical specifications

Windows 7 to 11+

AES 256 bit encryption

Access by RSA certificate/keys and/or password

Compatible with most market PKIs

Compatible with all types of file servers

(Windows, Linux, proprietary, etc.).

Compatible with all major PKCS#11 cryptoprocessor passes

(Smartcard or USB format)

You’re interested in this solution

Get a trial version

Need more information?

Tell us more about your project