Why D.E.S.C?

Security of customer and company data is a major concern in a digital world. But, members of your organization need to share sensitive information with customers and other external parties, and the need to quickly and easily collaborate often overrides security concerns! This exposes your company to reputational damage in the event of a data breach, and could even violate an ethical duty to keep customer information confidential. Thus, members of your organization are limited to a small set of choices for sharing sensitive information, none of which are ideal for security and convenience.

Your Choices

  • In-person meeting: Sharing data in person is the most secure method and is often necessary. But the cross-country and global reach of most businesses makes this inconvenient and costly, with daily data sharing impossible.
  • USPS or courier: Another secure option when time or money isn’t a major consideration, but time-sensitive shipping rates are costly and shipping worldwide to some countries involves the additional inconvenience of customs.
  • Digital Rights Management (DRM) solution: This secure solution is expensive and requires investment in new servers and changes to your firewall to enable external use. If cost isn’t a concern, consider this – the content can become permanently inaccessible if the DRM scheme changes or you discontinue service. Finally, you might not have the opportunity to choose the geographic storage location of the data.

    Many existing solutions have been built around DRM/e-room technology. Our solution is different. We are providing a true workspace with Desktop-as-a-Service technology. It is easy to get started with our solution to manage, share and edit any data – not just documents and spreadsheets – with parties external to your organization.
  • e-rooms (pseudo): In a pseudo e-room, your original data files must be altered and then rendered using proprietary software of the e-room provider. You and the party with which you are sharing data may have little or no opportunity to make changes to any documents in the e-room, especially if you require native applications to work with the files. There are a limited number of files that their controls may support.
  • Encrypted device: A great solution for shipping data between point – but they receiving party is in control of the data once they possess the device. They could distribute the data after they decrypt it, or forget to re-protect the device after use.
  • Password Protected file: This is a quick and easy way to share files with external parties, but what if you forget to password-protect? Even if the file is protected, the password still needs to be sent to the external party in a secure manner. Finally, the recipient of the file might send it back without password protecting or send it out unsecured to other external parties.
  • File-share service: Dropbox™, Google Docs™, Box™, OneDrive™, ShareFile™ or other distributed file sync services are all convenient and popular ways to share files with external parties. However, there is no containment of data shared through these services, and multiple copies of any files shared now exist wherever the external party has the service installed. While these services provide some auditing controls, redacting all copies would be difficult or impossible.
  • Email: By far the most convenient and popular method of communicating with external parties, this method is the least secure. Think of this like sending a postcard - unless you have end-to-end encryption set up, anyone can read it.

Consider This

We know that technology with a broad reach, sufficient security and containment exists in the marketplace, but what about provisioning, data access, and scale?

  • Provisioning Consider that choosing to create a virtual desktop infrastructure (VDI) for employee and external party remote access and document sharing requires you to make a significant investment in IT and support services.
  • Data Access Consider that IT involvement doesn’t end when the VDI is created. Any data folders and files accessible from the secure desktop require IT involvement to manage security.
  • Scale Consider the sheer number of unique interactions of employees with external parties, each requiring IT support.
IT administrators and professionals need a robust, proven platform that meets data containment and security policies. Employees need a way to quickly and easily share data with external parties.

D.E.S.C is the solution for both of those needs.

How It Works