CommandHub

CommandHub

Secure sensitive collaborations with
Intelligence Community-style ‘compartmentation’

Need to know Compartmentation

‘Need-To-Know’ Compartmentation

CommandHub applies the Intelligence Community principles of highly secure compartments, restricting user access on a ‘need to know’ basis.

With this approach, multiple levels of compartmentation, each with their own access controls, provide the ability to restrict specific information so that even senior people with high-level privileges will only see the information they need to perform their duties.

This granular control over individual compartments, using the principle of ‘least privilege’ greatly reduces the amount of time, complexity and error associated with adding permissions at the file or user level.

End-to-End Protection including Mobile Devices

Protecting information at the server level is only the start. CommandHub protects sensitive information at rest, in transit and in use. Its patented HubVault technology replaces insecure browsers with a double-encrypted file transfer tunnel.

Each file on the user’s device is encrypted with a unique randomly-generated key then encrypted again. A non-recoverable master key ensures the devices are virtually ‘uncrackable’ if misplaced or stolen.

This protection is particularly relevant to sensitive content on tablets and smartphones, which are inherently insecure with device encryption compromised because the key is stored on the device, remote wiping is ineffective if mobile and wifi access are disabled, and device caching retains components of recently viewed material.

End-to-End Protection including Mobile Devices
Genuine Ease-of-Use

Genuine Ease-of-Use

CommandHub was designed for business users, not IT specialists. After a short training session, administrators are able to establish logical compartments for collaborators and apply granular controls. When projects end, or teams or priorities change, the administrators can amend the controls and configurations themselves without involving the IT team.

The intuitive interface makes collaboration so easy and transparent that users won’t need help from IT or to take risky shortcuts, like sending sensitive files via personal email accounts.

Full text searching is provided and multiple file downloads and uploads are facilitated by a simple drag-and-drop functionality.

For mobile devices, both facial and fingerprint biometric access are provided to streamline the user experience. After the first use, connectivity can be automated without re-entering login details, and updated content automatically synchronised when connectivity is established.

Logical Business Controls

CommandHub was designed for business users, not IT specialists. After a short training session, administrators are able to establish logical compartments for collaborators and apply granular controls. When projects end, or teams or priorities change, the administrators can amend the controls and configurations themselves, Command Hub ensures intended business processes are followed while making it easy for users to share documents and collaborate.

Logical controls with advanced workflows facilitate restrictions on who can see, edit or save a file, who may move it to where, how approvals or rejections apply and the exact sequence of these steps. Controls can be set for how internal and external parties use sensitive content.

Many more document level options are available including categories, expiry, locking, version control and watermarking. the IT team.

Logical Business Controls

Let’s Talk

Find out how to Secure your Sensitive Information

Effective
Collaboration

Data Protection | Command Hub

100%
Australian

Owned, developed and managed with Australian Sovereign Cloud hosting

Cyber Security Protection | Command Hub

Independently
Certified

Validated to Australian Cyber Security Centre PROTECTED status

Data Sharing Protection | Command Hub

Document Sharing

Securely share your documents within, and
beyond, your organisation

Data Protection Companies | Command Hub

Need to know access

Based on Intelligence Community compartmentation principles

Data Encryption Software Companies | Process Control

Process Control

Business process workflows with selective document dissemination

CommandHub - Mobile Device Protection

Mobile Device
Protection

Patented multiple-encryption file storage and transfer technology