- Cloud
- Perimeter Security
- Right-to-Know Management
Confidentiality and partitioning in MS SharePoint™
- Microsoft SharePoint™ library encryption
- Internal or shared data accessible only to rightful owners
- Protection against theft, spying and disclosure
- Integrated user recovery and troubleshooting
ZONEPOINT guarantees the confidentiality of documents deposited in SharePoint libraries. Encryption provides this protection at the source, from the user’s terminal. It applies the right-to-know by partitioning access to documents in a way that is transparent to the user. Sensitive information that is published and shared is only accessible to the rightful owners and is therefore protected against theft, espionage and disclosure.
Why use it?
PROTECT YOUR ASSETS ON MICROSOFT SHAREPOINT SERVERS
Protection of internal document sharing
Large amounts of documents are filed, published, shared on internal SharePoint sites by employees on a daily basis, often with no real control over who will actually have access.
By automatically applying the encryption policy on a folder-by-folder basis, ZONEPOINT makes it possible to transparently ensure cryptographic partitioning between folders and between work groups.
ZONEPOINT thus guarantees the confidentiality of the data published within each team.
Confidentiality of external sharing
Popular web-based repository solutions struggle to meet the need for companies to share large volumes of data, often over the long term. They therefore choose to use SharePoint, which is more suitable.
But, in this use case, its exposure on the web and to third-party partners increases the risk of uncontrolled access to the data.
ZONEPOINT provides the necessary layer of encryption to ensure that data confidentiality is maintained.
How does it work?
ZONEPOINT Key advantages
Confidentiality with third parties
The SharePoint server is not part of the trusted zone. Neither are third-party operators!
With ZONEPOINT, an outsourced SharePoint server can be used with no risk of compromised confidentiality.
The data always remains encrypted on the servers and during transit, thereby guaranteeing their confidentiality for the operators. Companies are free to choose where to host their servers.
Corporate governance of encryption
Any document filed in a library is automatically encrypted in accordance with the security policy set by the “owner” (in the SharePoint sense of the term).
ZONEPOINT allows business line application or security officers to coordinate the application of their encryption strategy from their workstations.
They can delegate some or all of these operations to certain authorized users.
Simple and transparent
With ORIZON, documents are permanently encrypted. At no time does the data switch to unencrypted status on the servers.
The documents are encrypted and decrypted locally on the workstations with the user key.
The user works as usual and accesses encrypted documents via the browser or file explorer.
Labels and certifications
ZONEPOINT obtained the following certifications:
COMMON CRITERIA CERTIFICATIONS AT LEVEL EAL3+
APPROVAL FOR PROTECTING INFORMATION AT THE LEVEL EU RESTRICTED
APPROVAL FOR PROTECTING INFORMATION AT THE LEVEL OTAN RESTRICTED
Technical specifications
Compatible with MS SharePoint™ 2019, 2016 and 2013 servers
Supported browsers:
Chrome, Firefox, Edge
Access by certificate/key and/or password
AES 256 encryption
Compatible with all major PKCS#11 cryptoprocessor passes
(Smartcard or USB format)
Compatible with most market PKIs
Mobile app
ZONEMOBILE is available for iOS and Android
You’re interested in this solution
Get a trial versionNeed more information?
Tell us more about your projectDiscover our other solutions
- Cloud
- Perimeter Security
- Right-to-Know Management
ORIZON : Confidentiality of documents in Microsoft 365
– Integrated with Teams, OneDrive and SharePoint
– Compatible the majority of EFSS on the market (OneDrive, Dropbox, etc.)
– Transparent for users
– Guaranteed sovereignty for the company
- Right-to-Know Management
ZONECENTRAL : Data confidentiality and partitioning
– Protection of data across desktops, sharing and virtual environments
– Partitioning between users, service providers, work groups and departments.
– Very discreet and imposes no changes on user working habits.