Posts

Showing posts from August, 2017

CentreStack Enhances Security with Endpoint Encryption

Image
The CentreStack platform has recently been enhanced to provide better security with endpoint encryption. CentreStack also provides data-at-rest encryption, but that addresses a different threat model. Let’s review both threat models and explore the advantages in security and performance that come from CentreStack’s unique approach to endpoint encryption.Threat Models for Endpoint Encryption and Data-at-Rest encryptionCentreStack provides access to cloud storage through a mapped drive on your client machine. In order to do so efficiently, we present a directory listing of all content but nothing is downloaded until it is actually used. And once it is downloaded, the data is stored in a local cache on the disk. This approach is great for performance because it minimizes bandwidth usage and avoids overloading the device’s storage system by syncing everything down when most of it will never be used. But what happens if the device is lost or stolen? In that case, even though the thief may …