Are any of these true for you?

  • You are the Chief Security Architect or Chief Information Security Officer or hold a similar role
  • Your company offers diverse services and products, from consumer cell phones to corporate fibre networks and data centres
  • A service for major corporates is an analysis of their network security including a detailed report
  • Cyber-security professionals inside your and clients’ organisations collaborate on the project, discussing and editing the report before final release
  • Not all collaborators are under your control and you have little influence over how they use, share or store the highly sensitive data.
  • You’re fairly sure that mobile devices are used to access and share confidential client data and you know they increase the risk of exposure
  • Your clients expect you to keep their network data confidential; any data leakage, breach or theft could seriously damage the relationship and your reputation.

Have you tried to secure your Sensitive Collaborations by considering:

  • An Enterprise File Sharing System – but found it was much better for file-sharing than collaboration or security; both would need to be added by third-party products which would add complexity, cost and risk
  • Enterprise Collaboration Tools – but found that they were less secure than thought; security was an add-on and specified security levels didn’t apply to the tools themselves; needing the support of IT for user configuration was also a problem
  • Secure Collaboration Tools – but found these new products promised to restrict access but couldn’t control how content was used or stored; they also didn’t secure mobile devices and were too new to be proven in a telecommunications situation.

How CommandHub Protects your Company

Military Standard Design

CommandHub was purpose-built for secure collaboration from the ground up. It follows the Military Principle of multiple layered servers, deploying multiple levels of document encryption and infrastructure protection.

The CommandHub solution is IRAP certified to the Australian Signals Directorate ISM 2020 PROTECTED standard. All data is wholly hosted and managed in Australia under the Sovereign Cloud Principles for Critical Infrastructure.

Protection on Mobile Devices

CommandHub is designed to protect sensitive information at rest, in transit and in use – via a double-encrypted file transfer tunnel that replaces insecure browsers. With patented HubVault technology, collaborators can securely access and work with sensitive data even on smartphones and tablets. Data on mobile devices is double encrypted, and the master key is not stored on the device. This means total protection for mobile devices even if mislaid, lost or stolen.

‘Need-To-Know’ Compartmented Access

CommandHub applies the Intelligence Community principle of compartmentation, restricting user access on a ‘need to know’ basis. Your administrators can create multiple levels of compartments and set access and use controls for each, using the principle of least privilege. This gives you highly granular control over individual compartments and greatly reduces the time, complexity and errors associated with adding permissions at the file or user level.

Logical Business Controls

CommandHub makes collaboration easy for users and ensures that your company’s business processes are followed. You can set controls for who can see, edit or save a file, who can move or share it, how approvals and rejections apply, and you have control over the exact sequence of these steps as well as version control, watermarking, file-locking and more.

Easy To Administer and Use

CommandHub was designed to be deployed by business users, with an intuitive interface for collaboration, and no need for IT support. On average it takes about an hour’s training before your administrators are able to arrange content logically for your collaborators and apply controls to protect it. When circumstances change, they can easily make the necessary changes to settings.

Exact Tailoring to Your Needs

With over 500 configuration settings, CommandHub is easily set up to reflect the way your organisation works. By turning on or off rules for files, access, use, formats and settings at any level, CommandHub ensures that your critical data is fully protected, without affecting ease of use.

Proven In Other Demanding Situations

CommandHub has been protecting sensitive content in demanding situations for over a decade. As well as Telecommunications, these include Government, Justice, Defence Contracting, Finance and Healthcare. Ask us about our case studies.


Contact us to discuss how CommandHub could secure your sensitive collaborations.

Find out how to secure your Sensitive Collaborations