How is data at rest encrypted?
BooleBox uses 256-bit AES encryption standards. The data is divided into blocks, each of which is encrypted for storage. And – what’s more – users can choose and set their own Personal Keys on their data, to make it even more secure.
How is data in transit encrypted?
BooleBox uses Secure Socket Layers (SSL)/Transport Layer Security (TLS) for data transfer, creating a secure tunnel protected by 128-bit or higher Advanced Encryption Standard (AES).
What are Personal Keys and how do they work?
The files stored in the cloud services are usually encrypted with a master key. To increase the level of security, only with BooleBox you can encrypt your files with a Personal Key, your personal encryption key that you can create on your own, without requiring any technical knowledge. BooleBox allows you to apply a different Personal Key to each file or folder.
Watch the tutorial »
PROTECTION OF E-MAILS
How are e-mails sent via BooleBox, Outlook Encryptor or Gmail Encryptor encrypted?
BooleBox allows you to exchange encrypted e-mails using the same 256-bit AES encryption standard used to protect your files. By using Gmail Encryptor or Outlook Encryptor you can interface the e-mail encryption system of BooleBox directly from the e-mail client that you are used to use.
How file permissions are set?
With BooleBox you can set permissions on files in a granular manner, defining who can access the data, how and for how long. You can apply specific restrictions and update them in real time during manual file sharing, or by setting classifications, through which you can apply automatically your security policies, based on the data protection classes, set according of the company policies.
What is the anti-screen capture and deter photo shots system?
Anti-screen capture and deter photo shots are additional protective features that are applied to transferred files. By enabling the Anti-screen capture option, the file will appear to the recipient within a protected application that does not allow you to make screen capture. With Deter photo shots instead you can reduce the risks arising from the taking of pictures of the screen, thanks to the display the file through a mask controlled by the mouse pointer.
Watch the tutorial »
How do file watermarks work?
To mark indelibly certain types of confidential documents, in the process of sharing you can apply a Watermark, an image visible within the file containing a series of information about the use of the file itself (username, date and access time)
How is file access controlled and defined?
The BooleBox “Activity Logs” contains an advanced reporting system that provides detailed information on who has accessed data, which operations have been carried out and when.
What is file versioning?
To best protect your data and offer useful tools for Collaboration, BooleBox offers the possibility of saving up to 99 previous versions of the same file, in order to simplify their recovery in case of need.
How does the editing online works in BooleBox Cloud?
The BooleBox online editing allows you to view and edit files stored or received in sharing, without the need to download them locally and without need to have installed on your computer any application. And the highest level of security for your sensitive information is always guaranteed.
Can you use Tags and Classifications?
Sure. With BooleBox you can assign to files, folders and e-mail tags or classifications. With tags, you can easily search in the contents, with the classifications instead you can group content into categories to which automatically apply your security rules.
Can you add annotations on files?
Certainly, to optimize collaboration with BooleBox you can add and remove graphics and text annotations on your documents and view those created by other users.
CLOUD, HYBRID AND ON-PREMISES
Do the 3 versions of BooleBox offer the same functions?
Yes and the choice of version depends solely on the corporate preferences. With BooleBox Cloud all data is managed by BooleBox service which, to provide the highest efficiency and reliability, relies on the best Web services on the market. With BooleBox on-premises, all the infrastructure of the system can be installed locally within the company, to keep all the data within the internal IT infrastructure. With BooleBox hybrid you can finally benefit from a distributed installation that allows you to leverage, all the benefits of the cloud and of the on-premises.
What does the Hybrid version involve?
The hybrid version consists in the use of the different components of BooleBox infrastructure in the Cloud and On-Premises, depending on your company needs. The choice of hybrid installation may for example provide for a web application server and a database in the cloud (for the management and the permissions of the file on the business operations) and one on-premises storage (for storing business files). This way you can continue to have secure data within your infrastructure on a local server, in the cloud outsourcing all other functions.
How do I integrate BooleBox On-Premises with my company IT infrastructure?
You can have the BooleBox secure file-sharing system also installing the entire solution within your corporate infrastructure. The BooleBox application can be installed on Windows Server 2008 R2 or later and is perfectly usable in virtual machines. For storing data managed by the solution, can be used the enterprise storage already in use. As database finally, BooleBox leans to the popular MySQL.
INTEGRATION WITH MICROSOFT SYSTEMS
How is BooleBox integrated with Active Directory?
BooleBox provides a synchronization tool with Active Directory through which it is possible to use users and profiling configured in the Windows domain even within BooleBox.
How does Outlook Encryptor work?
Outlook Encryptor is a plug-in that integrates a special encryption function within Microsoft Outlook. Then, by opening Outlook, you can write a new e-mail, log in as a BooleBox user and choose your preferred protection criteria. Outlook will send you an e-mail containing a link to the indicated recipient. If this user has Outlook Encryptor installed on his/her device, the e-mail will be accessible immediately. If not, the recipient will be asked to click on the link and decrypt the contents based on the protection criteria set by the sender.
What are the advantages of SharePoint Encryptor?
Without changing the operating procedures which a company is used to, with the BooleBox Connector for Microsoft SharePoint you can apply the logics of encryption and protection of the BooleBox technology also to all the resources stored within the Microsoft libraries.