On tablets and smartphones two key vulnerabilities are the reliance on a remote wipe to destroy data - which requires connectivity - and the fact that the encryption key is stored on the device. The simple step of turning off cellular and WiFi access renders remote wipes ineffective and the ready availability of tools that retrieve the device encryption key allows an attacker access to all content.
The CommandHub technology addresses these and other vulnerabilities. It uses 10 to the power of 77 key combinations, does not store the encryption key on the device (still allowing permitted access at all times) and provides intrusion protection from a forensic attack (without the need for connectivity).
Where most file sharing and email attachment approaches only provide point-to-point (or user to user) document sharing, the CommandHub approach overlays controls that determine to whom, and on what basis, documents can be shared. It achieves this through the allocation of access to folders - rather than to documents where inadvertent exposure often results from similar file names - so that meaningful workflow can be readily established and processes maintained.
These controls, structured dynamically within the business function without requiring any technical skills, facilitate adherence to the intended workflow for approvals, updates, versioning, and selective viewing.