Why end-to-end encryption (E2EE) is not usually the medium of choice in organisations.

By | 4 minute read

Can Cryptshare encrypt end-to-end?

Again and again I am asked whether Cryptshare can also encrypt end-to-end. In such instances, I always ask the counterquestion: What exactly is meant by this? For me, end-to-end encryption actually refers to the end of the communication chain, meaning from client to client.

Why this often turns out not to be useful in practice, the questioners can commonly answer me themselves:

Disadvantages of end-to-end encryption 

  • Effortful operation, directly on the client
  • Requirements: Software, key or certificate on the end device
  • No archiving
  • No security (malware, data leakage)
  • Difficult backup scenarios
  • Holiday or sick leave arrangements
  • Leaving of the employee. What happens to the private key?

This means

If the transfer from the sender to the digital inbox of the receiving company (analogue: reception/HQ/post office) is secured, internal distribution can then be realised at the receiving company via their existing infrastructure.

Often, users on the receiving side don‘t want to have to use additional software but would rather like to be allowed to maintain their familiar processes.

Advantages of not using end-to-end encryption

Operating costs

Very low operating costs, as the system is centrally managed and you do not have to go back to individual client management, sparing the TCO.

Userfriendlyness

Using the already existing IT security infrastructure on both sides (mail gateway, firewall, content and malware scanning, DLP, etc.), in which a lot of money has been invested, instead of cancelling this by using end-to-end. This is userfriendly and creates acceptance among staff.

Automation

The possibility of the information on both sides to be archived or transferred directly and automated into a central document management system. This leads to an ideal further processing for the user, instead of creating hurdles it accelerates communication.

Adhoc usable

The communication works for external contacts with the onboard resources of their systems and requires no software installation and certificate management. Therefore, communication between people is enabled instead of prevented.

Questions

Let us answer your questions about end-to-end encryption


What is end-to-end encryption (E2EE) and how does it work?

In end-to-end encryption (E2EE), information is encrypted and decrypted directly at the communication partners. For example, a file is encrypted at the sender before it is transmitted. The nodes involved in the transmission (such as service providers) cannot access the encrypted information, but can only determine the sender and recipient information that is necessary for the delivery of the file. Decryption then only takes place after transmission on the recipient side.

Cryptographic procedures are used for encryption and decryption. For example, symmetrical or asymmetrical encryption with public keys and private keys.

The concept of end-to-end encryption is considered very secure and reliably protects information from unwanted access by third parties. Nevertheless, this also results in some practical disadvantages, which we address on this page.

Atmosphere Anonym
Download
Download: GDPR compliant email

In this practical guide to the European General Data Protection Regulation (EU GDPR), you will learn how you can meet the requirements and which technologies will support you.

Yubikey Computer Fingerprint Biometric
Product

Discover our unique product portfolio. Secure digital identities, access and data in a way that suits you.

Hiking Atmosphere Horizontal
Download
Download: Best practise for email security

Learn more about a successful email encryption with our 10 practical considerations.

Cryptshare Product
Product

Cryptshare helps your users to share confidential and large files in a secure way inside and outside your organization.

Atmosphere Team Desk Web App
Download
Download: Cryptshare - Functions and Security

Learn how Cryptshare and its associated products work with respect to the security measures that are used.

Pointsharp Cryptshare For Notes
Download
Download: Cryptshare for Notes and Domino

Exchange sensitive information and attachments of large file size. Via email, directly and convenient from HCL Notes.

Cryptshare For Outlook E Mail Classification
Download
Download: Cryptshare for Outlook

It enables you to securely share confidential emails and files without size restrictions, completely ad hoc via your regular email directly from your familiar Outlook environment.

Atmosphere Tunnel Quick
Download
Download: Cryptshare QUICK Technology

Finally no more passwords? Learn now how to make it happen with Cryptshare QUICK Technology

Atmosphere Team Work
Download
Download: Cryptshare Standards and certification

Learn more about the standards and certification of Cryptshare and its effective and confidence-building instruments in information security management.

Atmosphere Team Desk Web App
Download
Download: Protect data in transit

Cryptshare makes it easy to communicate in complete privacy with everyone you need to, instantly, and at any time. Cryptshare makes your email suitable for the challenges of a modern business and will be adopted easily and quickly by your users.

Atmosphere Hospital It
Download
Download: Düren Hospital

Learn how Düren Hospital shares personal information with health insurers, physician practices and other hospitals.

Cryptshare For Outlook E Mail Classification
Download
Download: Email classification

Cryptshare offers in addition to email encryption, the capability to classify data before transmission with Microsoft Outlook. Data classification is an important compliance standard asked for by the GDPR.

Atmosphere Network
Article

Looking for a modern, secure FTP alternative? Cryptshare is your user-friendly solution for file transfers. No user administration necessary, automatic data deletion

Atmosphere Shipping
Solution

Our solutions to send large files give you an intuitive to use solution that removes both the work and risk from the equation.

Atmosphere Microscope
Download
Download: Hannover Medical School

Read about how the MHH achieved a simple and secure exchange of personal data in healthcare.

Banner Event
Webinar

Learn from our experts how to empower your users with a user-friendly solution to transfer large and sensitive files to external parties with Cryptshare by Pointsharp.

Atmosphere Going Forward
Article

European cybersecurity company enters the German market. Pointsharp acquires Cryptshare with the support of Main Capital Partners.

Atmosphere Sunset Mobile
Download
Download: Prevent Shadow IT

Your guide to prevent shadow IT. Learn how to satisfy your compliance requirements and users at the same time - while securing your digital communication.

Atmosphere Laptop
Download
Download: RECARO

Do it like RECARO: Simplify and secure your data exchange. Find out more about how they achieved this here:

Atmosphere Healthcare
Download
Download: Secure communication in healthcare

Find out how the Robert Koch Institute as well as two other medical institutions in Germany have employed Cryptshare successfully for their purposes.

Pointsharp Cryptshare Webapp Phone
Webinar

Cryptshare is a solution for securing file transfers and email in a smart and user-friendly way.

Atmosphere Remote Work
Webinar

Learn from our experts how to empower your users with a user-friendly solution to transfer large and sensitive files to external parties with Cryptshare by Pointsharp.

Atmosphere Shipping
Download
Download: Sending large files

Read now how to overcome the challenge of sending large files on a daily base.