Why end-to-end encryption (E2EE) is not usually the medium of choice in organisations
Can Cryptshare encrypt end-to-end?
Again and again we are asked whether Pointsharp Secure Information Exchange can also encrypt end-to-end. In such instances, we always ask the counterquestion: What exactly is meant by this? For us, end-to-end encryption actually refers to the end of the communication chain, meaning from client to client.
Why this often turns out not to be useful in practice, the questioners can commonly answer me themselves:
Disadvantages of end-to-end encryption
Effortful operation, directly on the client
Requirements: Software, key or certificate on the end device
No archiving
No security (malware, data leakage)
Difficult backup scenarios
Holiday or sick leave arrangements
Leaving of the employee. What happens to the private key?
This means
If the transfer from the sender to the digital inbox of the receiving company (analog: reception/HQ/post office) is secured, internal distribution can then be realized at the receiving company via its existing infrastructure.
Often, users on the receiving side don‘t want to use additional software but would rather be allowed to maintain their familiar processes.
Advantages of not using end-to-end encryption
Operating costs
Very low operating costs, as the system is centrally managed, and you do not have to go back to individual client management, sparing the TCO.
Userfriendlyness
Using the already existing IT security infrastructure on both sides (mail gateway, firewall, content, malware scanning, DLP, etc.), in which a lot of money has been invested, instead of canceling this by using end-to-end. This is user-friendly and creates acceptance among staff.
Automation
The information on both sides can be archived or transferred directly and automated into a central document management system. This leads to ideal further processing for the user; instead of creating hurdles, it accelerates communication.
Adhoc usable
The communication works for external contacts with the onboard resources of their systems and requires no software installation and certificate management. Therefore, communication between people is enabled instead of prevented.
In end-to-end encryption (E2EE), information is encrypted and decrypted directly by the communication partners. For example, a file is encrypted by the sender before it is transmitted. The nodes involved in the transmission (such as service providers) cannot access the encrypted information but can only determine the sender and recipient information necessary to deliver the file. Decryption then only takes place after transmission on the recipient side.
Cryptographic procedures are used for encryption and decryption, such as symmetrical or asymmetrical encryption with public and private keys.
End-to-end encryption is considered very secure and reliably protects information from unwanted access by third parties. Nevertheless, it also has some practical disadvantages, which we address on this page.