cybersecurity | news -九游官网下载
microsoft office 365 includes a variety of applications and tools (such as exchange, sharepoint or skype for business) that are used daily in businesses. companies often entrust applications in office 365 with their most important data. this business-critical information must be protected against external cyberattacks, compromised user accounts and insider threats. rohde & schwarz cybersecurity’s new trustedgate for office 365 solution combines the highest security standards with transparent working in the public cloud with office applications.
a new virtualization process was developed for this purpose. uploading a document to office 365 creates a virtual copy of the original document (vdoc). the vdoc contains only the metadata of the original document (such as keywords or classifications), without its confidential content. authorized users can work transparently and securely with vdoc in existing workflows in office 365. the original document with the sensitive content is encrypted and broken down into several parts (chunks) via a software defined storage module (sds) into servers or clouds (also outside of office 365) selected by the user. the splitting of the encrypted original documents into chunks acts as an additional security measure against external attacks, e.g. with quantum computers. in addition, the configurable storage of chunks also enables the highest data protection regulations to be implemented, for example, the basic eu data protection regulation gdpr is also supported. the gdpr stipulates that certain files may not be stored abroad. with trustedgate for office 365, the user autonomously determines on which servers or cloud providers his encrypted original data or chunks are stored. this means that documents in office 365 can be shared in the public cloud, while their chunks are on their own servers or on domestic providers.
documents can be automatically encrypted with an existing classification. even in encrypted documents a secure full text search is possible. the access rights are defined for the corresponding persons or groups - the document is then decrypted transparently for authorized users during the download. users work in the familiar office 365 environment and administrators can configure access rights and security policies centrally and flexibly. an additional security gain for confidential data: attachments from emails can be automatically removed,encrypted and replaced with links in the email using a trustedgate dlp (data leakage protection) extension. the recipients can read, download or block the attachments via the links, depending on the assignment of rights and classification.