How Secure is Collanos?
Friday, July 20th, 2007In the 10th Annual Global Information Security Survey, conducted by InformationWeek and Accenture, some of the conclusions drawn from the data, gathered from over 3,000 US and Chinese organizations, are startling. A large majority of organizations feel just as vulnerable to security attacks as they were the previous year.
Although this survey focuses on large enterprises, here at Collanos our goal is to provide professional users (SMB and other organizations) with a true sense that their systems and data are in good hands and that with minimal resources (hey, Workplace is free!) you can reduce much of the security risks identified in this survey. As you can see in the chart below (drawn from the survey), viruses/worms, spyware/malware, spam, unauthorized employee access are the top four priorities on company’s security agenda.
Using Collanos Workplace all four of these vulnerabilities can be avoided altogether since Collanos workspaces are closed to invitees only. Your team decides who gets invited to these invite-only workspaces. Instead of using same-old-vulnerable-email to collaborate, users communicate in the workspace via Discussions and Chats.
Collanos does not install any spyware/malware on users’ machines (See Privacy Statement). You can create as many workspaces as you wish and invite only the employees that are members of the specific project at hand.
In regards to Customer-data theft (Priority #5) and Mobile device theft (#7), Collanos workspace data can be viewed only via the Collanos application, which is password (login) protected. If a computer is stolen, the thief would have to get access to the password protected application, otherwise, the data is plain gibberish. No team data is stored outside of the team members’ computers. Synchronization and storage is fully encrypted, using standard AES 256, and goes directly between team members’ computers when they can communicate directly in the network. Very often this is not possible because of Firewalls and NATs (Network Address Translation). In that case encrypted data is transferred through a relay peer in the internet outside of the peers firewall. These relay peers only buffer a small number of messages during the information transmission so the data is very fragmented.
The other concerns listed, for the most part, are vulnerabilities related to email, which again are not very relevant to Collanos workspaces.
Don’t get me wrong, there are still several items on our product roadmap that we feel are required to provide our users additional mechanisms to secure their data and systems. One example is extending the functionality of our Permissions matrix, so that teams can assign different levels of access to different employees and data. Collanos continues to focus on delivering an ‘enterprise-class’ reliable and secure solution that non-enterprise users can feel very confident using with one caveat, it will be simple and inexpensive to deploy and administer.
Sphere: Related Content
