CommandHub Banner

CommandHub provides secure solutions for the storage, collaboration, and distribution of sensitive corporate and government information

"The U.S. government now says it has evidence that North Korea was behind the [Sony] attack"
The Wall Street Journal - December 19, 2014

“There are two kinds of big companies … there are those who have been hacked by the Chinese and those who don’t know they have been hacked by the Chinese”
FBI Director, James B. Comey, 60 Minutes Interview - October 5, 2014

CommandHub® provides the peace of mind that only comes when sensitive information has been fully protected from unintended, or deliberate, access breaches. This exceedingly secure solution cuts data leakage, restores confidence and provides time-saving workflows. The innovative CommandHub Mobile app extends this security to ensure business process compliance and to fully secure documents while being transferred to or from a mobile device, while in use, and while stored on the mobile device.

Mobile Security

On tablets and smartphones two key vulnerabilities are the reliance on a remote wipe to destroy data - which requires connectivity - and the fact that the encryption key is stored on the device. The simple step of turning off cellular and WiFi access renders remote wipes ineffective and the ready availability of tools that retrieve the device encryption key allows an attacker access to all content.

The CommandHub technology addresses these and other vulnerabilities. It uses 10 to the power of 77 key combinations, does not store the encryption key on the device (still allowing permitted access at all times) and provides intrusion protection from a forensic attack (without the need for connectivity).

Document Management

Where most file sharing and email attachment approaches only provide point-to-point (or user to user) document sharing, the CommandHub approach overlays controls that determine to whom, and on what basis, documents can be shared. It achieves this through the allocation of access to folders - rather than to documents where inadvertent exposure often results from similar file names - so that meaningful workflow can be readily established and processes maintained.

These controls, structured dynamically within the business function without requiring any technical skills, facilitate adherence to the intended workflow for approvals, updates, versioning, and selective viewing.

Products

CommandHub

Secure storage, collaboration, and dissemination of sensitive corporate and government documents

CommandHub Mobile

Protect files on mobile devices from inadvertent exposure and determined attacks

iFortress

Protect private notes, files and photos on your smartphone or tablet with enterprise-grade security