Securosys 365 DKE
Office 365 data with your secure HSM keys
Challenge
One of the biggest challenges for professionals and organizations in the cloud era is ensuring the confidentiality of their private documents. With increasing frequency of data breaches in the cloud, data protection methods must evolve to meet compliance and regulatory standards. Organizations seek data sovereignty to prevent unauthorized access and ensure compliance with local laws. The main difficulty lies in maintaining control over data and mitigating cloud computing risks while keeping the process straightforward for end-users.
Solution
Effortlessly secure your data within Microsoft Office applications with Securosys 365 DKE. Encryption is key to protecting cloud data, and its effectiveness depends mostly on key management. Securosys 365 DKE functions similarly to a Cloud Access Security Broker (CASB), encrypting highly sensitive data on the client side before transferring it to the cloud. This ensures robust security and regulatory compliance with two encryption keys: one controlled by you and one stored in Azure.
The reference implementation from Microsoft for DKE has been significantly enhanced by Securosys for increased functionality, robustness, and enterprise alignment. Leveraging Securosys CloudHSM technology, it provides the highest grade of customer key protection.
For the end-user, the process is as simple as selecting a sensitivity label for documents or emails. This action initiates a dual encryption process by Microsoft and Securosys, safeguarding data even in the event of breaches.
Key Benefits
Fully Managed DKEaaS
Our solution can be deployed in your environment in an hour or less, providing immediate benefits and minimal disruption.
Highest Compliance Standards
Our solution adheres to stringent security standards. Keys are stored on FIPS 140-2 level 3 and Common Criteria EAL4+ validated HSMs, and our service operations are ISO 27000 certified, ensuring the highest data protection and compliance.
Globally Accessible
Securosys 365 DKE is available 24/7 as a cloud-based service, accessible from anywhere in the world.
Use Cases
Book a 30min-demo
Schedule a personalized demo to explore how our solutions can benefit your business. This session will provide a high-level overview, tailored to your needs, and give you the chance to ask any questions. If you need a more in-depth technical demonstration, we can arrange a follow-up with one of our experts.
If you prefer you can also watch the video below or talk to sales by using our contact form.
environment, ensuring your data remains secure and sovereign.
FAQ
Why should I do a proof of concept?
What are the steps to install S365?
1.Preparation:
- Minimum 50 users
- Microsoft 365 E5 & Microsoft 365 Office Apps for Enterprise (version 18.2008.12711.0 or later)
- From 1 to 10 sensitivity label names compliant with your organization's information protection policies. Examples provided in the resources
2. Installation (30 minutes)
- Download & install the Azure Information Protection Unified Labeling Client (version 2.14.93.0 or later) on each computer (3 minutes per user)
- Enable DKE
3. Configuration (1-4 hours)
- Log in and retrieve your Securosys365 admin credentials through our support portal
- Create & publish sensitivity labels in your Azure tenant
- Test
Can Securosys support me for the installation?
We can offer a 30-minute demo with one of our Senior Product Engineer to address the most common questions.
Unfortunately, we cannot provide consulting resources to work on your infrastructure and perform the installation on your behalf.
However, we would be happy to recommend consulting partners to support you with the installation.
How to kickstart a proof-of-concept for S365?
- Liaise internaly with the relevant stakeholders. Most likely the CISO
- Assess the complexity of the solution, the pre-requisites, the technical & human resources needed. Appoint external resources if needed
- Install Azure Information Protection on your environment and link it to your Securosys365 tenant (30 minutes)
- Choose and implement security labels (1-4 hours)
- Run some tests as an end-users on Excel, Word, PowerPoint, Outlook, to cover your most important use cases
What is included in the monthly subscription?
The monthly subscription includes:
- Infrastructure/hardware costs - Primus HSM, etc.
- Software costs with continuous improvement
- Online console to manage your key
- 24/7 support & maintenance
Not included:
- Azure & Microsoft desktop App licences
- Any consulting/training/support for the Proof of Concept PoC & onboarding - We can recommend some partners instead
What are the technical skills needed to install S365?
To install S365, you need to understand the following concepts:
- Azure Fundamentals
- Azure Information Protection (AIP)
- Azure Active Directory (AAD)
which would be most likely CISO, IT Manager/Director, System Administrator, Security Analyst, Security Engineer, Security Architect. They can be supported by Security Consultant, IT Auditor, Data Protection Officer (DPO), Compliance Officer, Risk Manager.
Why does S365 work with Microsoft E5 licences, but not E1 & E3 ones?
Securosys365 works with the Double-Key Encryption (DKE) protocol from Microsoft, which is only included in E5 licences.
If you don't have an E5 licence, Microsoft offers a 30-day free trial here
What happens if I lose access to my documents, or if my Microsoft Office 365 subscription is cancelled?
The data would remain encrypted and could not be used by anyone
What happens to my documents if I unsubscribe from S365?
Before your subscription ends, we recommend the following exit process:
- Decrypt all your documents and move them to their new location
- If you have a lot of documents, you can run a PowerShell script to decrypt any DKE-encrypted protected files.
Please contact us at least 1-month before the termination to ensure a smooth exit process.
Microsoft Office already encrypts the data by default. Isn't that sufficient?
While Microsoft Office does include default encryption for data, Securosys365 goes beyond by providing additional layers of security. Our solution not only enhances encryption but also empowers you to control who can encrypt/decrypt data, offering advanced threat detection and customization options tailored to your organization's specific needs. This ensures a comprehensive and customizable approach to safeguarding your sensitive data alongside the default encryption provided by Microsoft Office.
What makes S365 different from other solutions?
The main difference is that most of the alternative solutions rely on Microsoft's DKE open-source project which requires:
- a dedicated infrastructure project
- engineering to deploy the software
- regular maintenance
S365 is one of the few fully managed DKEaaS on the market that removes all these pain points for you.
Once a sensitivity level is chosen, can I update if to a higher/lower one?
Can Securosys decrypt my documents?
No, Securosys cannot access your data because:
- Securosys doesn't have access to your Azure tenant
- The decryption is performed on the client's device by the Office Apps
Why choosing multiple sensitivity labels ? Can't we simply have one and apply it to all the data?
Within your organization, you might have different groups of users with different roles & duties. The permissions will be different for each of them.
Thus, you will need a specific sensitivity labels to match each use cases.
What does Securosys365 protect my documents against?
- Security vulnerabilities in complex hyperscaler environments
- Malicious activities by hyperscalers or employees
- Loss of intellectual property
What happens if the key is lost?
If the Securosys365 key is lost, you could not decrypt your data anymore.
However, this risk is being eliminated as your key is stored in an HSM which is redundant.