Discover our practical, no-nonsense approach to
CommandHub was founded for one purpose: to resolve the dilemma between enabling collaboration and protecting sensitive content.
Our founders had unique credentials to resolve the dilemma; experience in strategic advisory to major local and global corporates and with advanced security technologies in Silicon Valley and Washington DC.
Their advisory clients included BHP Petroleum, Commonwealth Bank, EDS, Fujitsu, IBM, Texas Utilities and Toyota.
The advanced technologies included biometric identification, digital surveillance, mobile data protection, nuclear energy recovery and DARPA-originated cybersecurity initiatives.
Combining industry insights with Intelligence Community thinking, CommandHub the product was the solution to the dilemma.
Designed from scratch on Military Principles, CommandHub uses ‘compartmentation’ to restrict access on a ‘need to know’ or ‘least privilege’ basis. In this way, even users with seniority or high-level security clearance won’t be granted access to compartments whose contents they don’t need to know to perform their roles. This contrasts with user-level or file level controls which can’t prevent breaches of the infamous ‘Chelsea Manning’ type.
Logical Security and Controls
Our founders were driven by the principle of logic applied to both security and business processes.
Logical security makes it difficult for users to breach by accident or intent while making it easy for authorised users to work with. Advanced workflows make it easy to enforce logical business processes so that sensitive material can only be shared, used and stored as allowed by corporate rules.
Blue Chip Clients
We are proud to count many household names as clients, but our contracts prohibit us from naming them. Some of our client deployments include securing collaboration on:
- Cabinet-level documents
- Corporate intellectual property, customer data and risk mitigation processes
- Multi-billion-dollar mergers & acquisitions
- Classified mission projects for defence contractors
- Sensitive information between Government departments
- Confidential Supreme Court documents
- Cybersecurity reviews for a global consulting firm
- Confidential executive documents for a major bank.
To find out more, contact us.
What drives us
To be the global provider of secure collaboration solutions trusted by industry and government
To continually develop technologies which lead the world in secure collaboration and are cost-effective and easy for non-IT personnel to use
We value diligence, commitment, directness, practicality and plain-speaking – in our people and in our clients, partners and associates
Find out how to Secure your Sensitive Information