URL:https://www.linkedin.com/pulse/curtain-e-locker-dlp-encryption-combined-access-ohz1c
Description:Curtain e-locker DLP combines efficient encryption with permission control to achieve zero leakage of secure collaboration, and provides a secure closed-loop solution for cross-regional collaboration of enterprises.
CLK, a multinational manufacturing company that produces packaging machines, has production plants in multiple countries. The technical team needs to collaborate on design on a daily basis and frequently share key data such as design drawings and process parameters. Since these data are related to the company’s core competitiveness, the management has set clear requirements: it is necessary to ensure the confidentiality of files during the transmission process of R&D personnel, and to effectively control the subsequent storage location and use of files.
CLK has tried to use traditional methods to encrypt and transmit files, such as compression package encryption, email encryption, file system encryption, etc. However, these methods often have some unavoidable problems:
- The encryption and decryption process is complicated, employees are less willing to use it, and often bypass it;
- After the file is sent out and decrypted, it cannot be controlled anymore, and the recipient can copy or save it at will;
- More importantly, there is a lack of effective behavior records and authority audits. Once a leak occurs, it is difficult for the company to trace the source of responsibility.
These limitations have always made it difficult for management to circulate confidential files flexibly within the company.
To solve these problems, CLK finally deployed the Curtain e-locker DLP solution. In addition to access management, they focused on using the system’s “decryption only by client” function to ensure that confidential files remain encrypted during employee transmission, and only employee devices that belong to the company’s authorized system can decrypt and view them.
Curtain e-locker will establish a “protected area” in the system or server shared files and user computers that the company needs to protect, and protect and control the files in this controlled protected area. CLK employees only need to select the files to be shared in the protected area, right-click “Encrypt to (Decrypt in Client only)”, and they can generate encrypted files and transfer them to the recipient in any way. As long as the receiving colleague has the Curtain client installed on his device, he can double-click the file to automatically decrypt it to the local protected area. The decrypted file will automatically apply the usage permissions set by the company for the colleague, such as prohibiting printing, prohibiting saving, etc., to prevent the risk of leakage and improper operation.
Curtain e-locker also has a complete audit log that records the use of employees and controlled documents, helping CLK to perform audits quickly and efficiently.
Curtain e-locker’s file encryption transmission mechanism not only avoids the complicated encryption and decryption problems of traditional encryption methods, ensures the transmission security of important files, but also solves the problem of “out of control” after encryption is sent out. It deeply combines permission control with encryption to achieve true encryption control. The document’s full lifecycle (encryption→transmission→decryption→usage) is secure, convenient, controllable, and traceable, providing strong support for CLK to achieve efficient and secure cross-regional collaboration.