Companies that work with controlled information must comply with ITAR and EAR. There are no certifications for ITAR or EAR compliance and violations of these regulations may result in both criminal and civil prosecution. Luckily HighSide’s E2E encrypted collaboration platform is fully compliant with both ITAR and EAR regulations, giving you modern collaboration: chat, file share, & geographic access controls through a secure cloud hosted system.
Talk to a SpecialistNot only does ITAR require E2E encryption, but it requires that no third party (which means the provider) has access to your keys. Additionally, it requires strict geographic access controls to data and conversations surrounding ITAR controlled projects. HighSide’s decentralized Encryption & Authentication Protocol ensures that no one (not HighSide, not even your admins) have access to users private key material and our patented RF signal triangulation system ensures users are only granted access to the system when in authorized geo-locations.
Take a deep dive on ITAR & EAR requirements hereHighSide gives your ITAR regulated teams a familiar user experience, with chat, messaging and voice / video / screen share that feels just like less secure but widely used collaboration and consumer messaging apps. Users can easily message any member of the team (provided their security groups allow for this), share pictures or files to individuals & groups or conduct real-time voice & video calls. All activities on the app, whether it’s sharing an emoji or the latest ITAR regulated data is encrypted on-app with cryptographically unique encryption.
In addition to chat and communication capabilities, HighSide also offers an integrated secure file storage and sharing feature (SecureDrive) that can be used to house operational documentation, maps, plans, photos and more. Share “drives” securely with various members of the team and quickly disseminate important information on a “need to know” basis with configurable security groups.
- E2E encrypted cloud repository ensures your data is always secure - and with a distributed root trust model, no EKM or PKI reliance.
- Selectively enable local editing or synchronization for files and data types that need to be edited.
- Enable third party data collaboration with granular RBAC and user access controls - provide temporary authorization for specific projects to facilitate productivity.
- Built-in support for Microsoft RMS, Azure Information Protection (AIP), and leading endpoint DLP systems.
- Data Residency, Guest Users & Custom Retention Management.
Unlike other popular messaging apps and collaboration platforms, the admin team can control who is allowed into the environment, and has complete authority to revoke encryption keys, suspend access, define acceptable geographical boundaries for usage, manage device authorizations and more. Lastly, all event and message data can be archived for compliance and e-discovery requirements - but also, message and data retention periods are flexible down to minutes or up to centuries and can be easily set to meet with the mission requirements.
Keys are never exposed via SMS or shared across unsecure communications channels. HighSide’s distributed private root of trust model ensures no one can intercept or spoof a user's keys, eliminating “eavesdropping” risks. Designed on a bit-torrent style data transfer framework, HighSide supports extremely poor connectivity environments and ensures all messages, pictures, files, and communications are securely and reliably delivered.
Director Research and Development IT | Global Materials Science Corp