Current stage of development of the innovation

Our innovative solution solves the problem by connecting both sides using a direct, authorised and time limited encrypted tunnel for exchanging data. SUP2PER enables large binary files, images, video and audio streams to be sent through secured communication channel.

struktura3

SUP2PER solution consists of the following systems

SUP2PER server as a handshake server, dedicated to establishing peer to peer connections. It is part of the company system \ data provider and its function is merely to connect people inside and outside the organisation (server as a term in this case means the only application available at all times; the username, password and certificate are necessary for the user authentication).

SUP2PER client as desktop application needed for sharing files.

  SUP2PER File Share as dedicated application for accessing documents in the organization and access management.

5 REASONS TO USE SUP2PER

Untitled-2

Modular architecture

Modular architecture

Sup2per connectors provides access to various closed external systems in order to enable document sharing among peers. Solution enables better protection against unauthorised use of personal data, breach of confidentiality and cybercrime. Modularly designed application enables quick integration into existing security systems without extra cost.

Reducing costs

Reducing costs

Access to external enterprise systems is managed via connectors – users sharing data do not need licences for it.SUP2PER solution reduces organisation costs by decreasing the number of licenses purchased for existing applications (SAP, Document Management System).By integrating SUP2PER solution, only one license per existing application for one SUP2PER File Share installation is required, instead of one licence per each registered user.

Untitled-4

Untitled-5

Approval workflows

Approval workflows

Approval of sharing documents with external peers compensates security risks of access to enterprise systems and confidential data.Each organisation set workflow by themselves and it is unique process.

Reducing IT workload

Reducing IT workload

Granting access to documents via enhanced workflows transfer security from IT people to department chiefs.Authorization and user or device connection requires 5 lines of code.

Untitled-1

Untitled-3

Audit trail

Audit trail

Enhanced logging mechanism tracks all user and peer activity.