SlideShare a Scribd company logo
1 of 6
Download to read offline
Reprint from No. 1 | January 2014 |
Secure
communication
www.plm-it-business.de
2 PLM IT REPORT No. 1, 2014
DATA AND PROCESSES
Greater data security for
e-mail communication
The case involving Edward Snowden has shown us two things: Firstly, how re-
miss we are when it comes to handling confidential information and secondly,
how shamelessly inquisitive intelligence services exploit this fact. It‘s anyone‘s
guess whether they really only use the information they extract for intelli-
gence purposes or also for economic purposes. What is clear is that e-mail en-
cryption alone is not enough to protect our know-how – we need protection
mechanisms that are integrated in the e-mail programs themselves.
Simple but secure:
With OpenDXM GlobalX
from PROSTEP, encrypted
data exchange is as easy
as sending an e-mail.
PLM IT REPORT No. 1, 2014 3
D ATA A N D P R O C E S S E S
Be honest: Do you encrypt your e-mails? If
you don‘t, you are in good company. Appro-
ximately 144 billion e-mails are sent around
the world each day (1), of which roughly no
more than 3 percent are encrypted. Easy prey
for data thieves. The reason for this is quite
simple: most users find setting up encrypti-
on much too complicated. Otherwise, how
do you explain the large number of Internet
sites dealing with the topic „e-mail encrypti-
on made easy“? If the proportion of encryp-
ted e-mails is nonetheless growing, then it
is because, paradoxically, spam is being en-
crypted to an increasing extent. According to
Pingdom, spam now accounts for 68.8 per-
cent of all e-mail traffic worldwide.
Following the most recent scandals, many
users are rightly asking themselves whether
encryption is even worth the effort. Accor-
ding to a report in the Guardian, Microsoft
of all people has revealed itself to be the fox
guarding the hen house, helping the NSA,
America‘s most secret of intelligence services,
to circumvent the encryption of data by those
using its services (2). As if MS Outlook didn‘t
already have (hadn‘t already had) enough
gaps in security – several years ago, even the
German Federal Office for Information Secu-
rity felt compelled to issue a warning about
using the American software giant‘s e-mail
programs (3). That has not done MS Outlook‘s
popularity any harm.
Irrespective of all safety concerns, it is im-
possible to imagine our working lives without
Outlook & Co. According to a study conducted
by the Fraunhofer IPK together with CONTACT
Software and the VDI, even engineers, who
should actually be undertaking more creative
work, spend more time on communication
and coordinating development projects than
on their core tasks (4). Their most important
IT tool is therefore not the CAD system but
rather the e-mail program, which many of
them still use to exchange sensitive informa-
tion such as CAD and product data as well as
key business figures despite the strict security
measures in place in the companies.
Simple solution required
What many users might not know is that
even encrypting e-mails will not provide suf-
ficient protection for their intellectual pro-
perty. The encryption mechanisms included
in e-mail programs normally only encrypt the
e-mail body but not the attachments, which
often contain confidential information. This
not only applies to CAD data, which is full of
design know-how well worth protecting, but
also to sensitive simulation data (e.g. from
crash tests) or copyright protected graphic,
image, music and video files. These files often
reach a size that would bring any e-mail pro-
gram to its knees, i.e. it is either impossible to
send them as an attachment, or they can only
be sent distributed over multiple e-mails.
You have to wonder why even at larger
companies so much data is still being ex-
changed without any security measures
whatsoever. Probably because things usual-
ly have to be done quickly, and all the other
mechanisms are more complicated to use
than the e-mail program that all of us can use
in our sleep. Therefore, a key requirement for
any secure data exchange solution is that you
can use it just as easily as you do your e-mail
program. Or better yet, you use it exactly like
you do your e-mail program. This is a requi-
rement that PROSTEP AG intends to meet with
its new OpenDXM GlobalX Outlook integration
component.
Fully integrated in MS Outlook
From the users‘ point of view, the data ex-
change client is fully integrated in the Out-
look user interface. The only difference is two
additional buttons, one for sending large files
and the other for forcing files of any size to
be sent via OpenDXM GlobalX. The first func-
tion is actually redundant since the rules of
OpenDXM GlobalX allows flexible use while remaining highly secure.
PLM IT REPORT No. 1, 2014 4
D ATA A N D P R O C E S S E S
the data exchange platform specify that once
data exceeds a certain volume, it is automa-
tically exchanged via OpenDXM GlobalX. The
problem is that Outlook‘s standard „Attach
File“ function needs several minutes to deter-
mine that a file containing multiple gigabytes
of data is much too big to send by normal
e-mail. Users can overcome this obstacle with
the „Attach Large File“ function.
But the OpenDXM GlobalX Outlook inte-
gration cannot only be used to automatically
„redirect“ files that exceed a certain size to
the data exchange platform. The system ad-
ministrator can with little effort define rules,
for example that files with a certain extension
are always to be sent via OpenDXM GlobalX,
i.e. are to be sent in encrypted form. Or files
being sent to people in countries that are not
so strict when it comes to know-how protec-
tion. Thanks to the second button, users also
have the option of using OpenDXM GlobalX to
send any file to any user, even if none of the
defined rules automatically applies.
Activating spontaneous recipients
From the recipient‘s point of view, down-
loading the data will vary depending on
whether or not he is also using the OpenDXM
GlobalX Outlook integration. In either case,
he will be notified that data is available for
download. This message can include the body
of the original e-mail or not – depending how
the company involved has configured the so-
lution. If the recipient is not using an Out-
look integration, he will have to log on to the
OpenDXM GlobalX portal, which opens auto-
matically when the link in the message is cli-
cked, using his password to access the down-
load. If he is also working with the OpenDXM
GlobalX Outlook integration, downloading is
even easier – all he needs to do is click on the
file attachment in the OpenDXM GlobalX mes-
sage; he can then download and save the file
as usual using Outlook. In this case, additio-
nal authentication on the OpenDXM GlobalX
portal is not necessary.
An interesting question is what happens if
the user sends files to a recipient who is not
yet known in the OpenDXM GlobalX databa-
se. A company can define a uniform template
for this spontaneous, or ad hoc, exchange
process which automatically generates a
temporary account, possibly with restricted
user rights, for the recipient. In this case, the
recipient not only receives a message about
the data that is available for downloading but
also two other e-mails: one containing his
user ID and a second containing a tempora-
ry activation link prompting him to specify a
password for access to the portal.
The solution is so flexible that it is even
possible to define personal encryption with a
public and a private key ad hoc. In this case,
the files are encrypted using recipient‘s pu-
blic key. The recipient is the only person who
possesses the private key needed to decrypt
them. A wizard will help him generate the pri-
vate key during the course of an online sessi-
on. The applet prompts him to define what is
referred to as a „keystore“ and specify where
the private key is to be stored, for example
on a USB flash drive. It also prompts him to
protect access to the keystore with a separate
password. Personal encryption using keys of
up to 4096 bits ensures the highest possible
level of data security.
Secure data exchange platform
OpenDXM GlobalX is a highly secure data
exchange platform that is normally set up
by the company who owns of the collabo-
ration projects; but it can also be hosted by
PROSTEP AG or another provider. It is nor-
mally installed in what is referred to as the
„demilitarized zone“, i.e. between the inter-
nal and external firewalls of the company in
question on a central server to which only
system administrators have access, which
allow them to define the profiles for the ex-
change partners and the rules for the data
With OpenDXM
GlobalX from
PROSTEP, encrypted
data exchange is as
easy as sending an
e-mail.
exchange process. In addition, the encryp-
tion mechanisms are stored on the server,
which also performs any necessary proces-
sing, such as virus checks, forwarding data to
backend systems or data conversion.
The data, which is encrypted at all times,
can be placed in an OpenDXM GlobalX File-
Vault on decentralized servers to optimize
data traffic over large distances. This means,
for example, that the American subsidiary of
a German company makes the data available
to a project partner in the USA locally even
though the partner has to log on to the cen-
tral server in Germany in order to download
the data. This architecture offers the advan-
tage that the OpenDXM GlobalX server can be
operated in a country with strict data protec-
tion regulations, where intelligence agencies
cannot simply demand that the keys be han-
ded over – as is the case in the USA, for ex-
ample. Without the keys, the encrypted data
in the remote FileVaults is of no use to them.
The data to be exchanged is encrypted
using public-private key encryption when it
is uploaded to the platform. In the case of
normal encryption, OpenDXM GlobalX is the
master of the public and the private key and
ensures that the data is automatically decryp-
ted when it is downloaded so that the autho-
rized recipient can read it. If, on the other
hand, the person sending the data decides to
use personal encryption, the recipient must
have a private key to which only he has ac-
cess in order to read it. In this case, the intel-
ligence services would have to devote even
more time to cracking the encryption since
they will need the private key to do this and
it is stored password protected on the user‘s
storage medium of choice.
Documentation of
exchange operations
Sending data via the exchange platform
has the additional advantage that all ex-
change operations are logged and can thus
be used at any time for audit purposes. Alt-
hough OpenDXM GlobalX does not store the
5 PLM IT REPORT No. 1, 2014
DATA AND PROCESSES
The advantages: transfer of
very large files with Outlook,
full documentation, automatic
compliance with company-
specific rules, highest possible
level of security for confidential
documents and easy operation.
Highest possible level of
data security even when
exchanging data with
Outlook.
attached file, it does store all the
other information that belongs to
each individual data exchange ope-
ration. When using the OpenDXM
GlobalX integration, even the text
body of the original e-mail is also
archived. The text body is not stored
as a document but written directly
to the database instead, thus ma-
king it possible to perform full-text
searches according to sender, reci-
pient, subject or other search cri-
teria. The user, of course, only sees
the e-mails that he himself has re-
ceived or sent via OpenDXM GlobalX
– a group leader or system admini-
strator, on the other hand, have an
overview of all the exchange opera-
tions for a certain project.
The integration of the data ex-
change platform OpenDXM GlobalX
in MS Outlook not only provides the
highest possible level of data secu-
rity and protection for file attach-
ments but also allows the exchange
operations to be traced at all times.
Acceptance of the solution depends
largely on the fact that it is actually
invisible to the end user. The ability
to define uniform, enterprise-wide
rules for handling sensitive data is
in case of doubt and in the long run
more important than getting the
better of the data spies at the NSA
and Co.
(1) see http://royal.pingdom.
com/2013/01/16/internet-2012-in-
numbers
(2) see www.theguardian.com/
world/2013/jul/11/microsoft-nsa-
collaboration-user-data
(3) www.welt.de/wirtschaft/web-
welt/article5918620/Bundesamt-
warnt-jetzt-auch-vor-Outlook.html
(4) www.ingenieur.de/Arbeit-
Beruf/Management/Ingenieure-
Freiraum-fuer-Engineering-Kon-
struktion
Michael Wendenburg, Sevilla
(www.wendenburg.net)
PROSTEP AG, Darmstadt,
Phone +49 6151 9287-0,
www.prostep.com
The OpenDXM GlobalX Outlook integration is
now available.
w w w . p r o s t e p . c o m
PROSTEP AG
Dolivostraße 11
64293 Darmstadt
Phone +49 6151 9287-0
Fax +49 6151 9287-326
PROSTEP France S.A.R.L.
Toulouse & Chassieu
7 rue des Cyprès
F-69680 Chassieu
+33 478 908543
PROSTEP AG
Dolivostraße 11
64293 Darmstadt
Phone +49 6151 9287-0
Fax +49 6151 9287-326
PROSTEP France S.A.R.L.
Toulouse & Chassieu
7 rue des Cyprès
F-69680 Chassieu
+33 478 908543
PROSTP INC
300 Park Street, Suite 410
Birmingham, MI 48009
Phone: +1 248 247 1007
Fax: +1 248 247 1011
US Toll Free: 8-PROSTEP-01 (877-678-3701)
Fax: 8-PROSTEP-02 (877-678-3702)

More Related Content

More from Joseph Lopez, M.ISM

More from Joseph Lopez, M.ISM (9)

Data Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEPData Security and Know-How Protection from PROSTEP
Data Security and Know-How Protection from PROSTEP
 
3D PDF Technology from PROSTEP
3D PDF Technology from PROSTEP3D PDF Technology from PROSTEP
3D PDF Technology from PROSTEP
 
3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A Comparison3D Formats in the Field of Engineering - A Comparison
3D Formats in the Field of Engineering - A Comparison
 
The Challenges of PLM Collaboration
The Challenges of PLM CollaborationThe Challenges of PLM Collaboration
The Challenges of PLM Collaboration
 
Smart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLMSmart Engineering - The Impact of Industry 4.0 on PLM
Smart Engineering - The Impact of Industry 4.0 on PLM
 
Securely Exchange CATIA Data Outside Your Enterprise
Securely Exchange CATIA Data Outside Your EnterpriseSecurely Exchange CATIA Data Outside Your Enterprise
Securely Exchange CATIA Data Outside Your Enterprise
 
Do-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgrationDo-It-Yourself ENOVIA PLM MIgration
Do-It-Yourself ENOVIA PLM MIgration
 
How to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your EnterpriseHow to Securely Exchange Data Outside Your Enterprise
How to Securely Exchange Data Outside Your Enterprise
 
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

MS Outlook Secure Data Exchange for Automotive/Aerospace/Manufacturing Suppliers, Vendors, External Partners

  • 1. Reprint from No. 1 | January 2014 | Secure communication www.plm-it-business.de
  • 2. 2 PLM IT REPORT No. 1, 2014 DATA AND PROCESSES Greater data security for e-mail communication The case involving Edward Snowden has shown us two things: Firstly, how re- miss we are when it comes to handling confidential information and secondly, how shamelessly inquisitive intelligence services exploit this fact. It‘s anyone‘s guess whether they really only use the information they extract for intelli- gence purposes or also for economic purposes. What is clear is that e-mail en- cryption alone is not enough to protect our know-how – we need protection mechanisms that are integrated in the e-mail programs themselves. Simple but secure: With OpenDXM GlobalX from PROSTEP, encrypted data exchange is as easy as sending an e-mail.
  • 3. PLM IT REPORT No. 1, 2014 3 D ATA A N D P R O C E S S E S Be honest: Do you encrypt your e-mails? If you don‘t, you are in good company. Appro- ximately 144 billion e-mails are sent around the world each day (1), of which roughly no more than 3 percent are encrypted. Easy prey for data thieves. The reason for this is quite simple: most users find setting up encrypti- on much too complicated. Otherwise, how do you explain the large number of Internet sites dealing with the topic „e-mail encrypti- on made easy“? If the proportion of encryp- ted e-mails is nonetheless growing, then it is because, paradoxically, spam is being en- crypted to an increasing extent. According to Pingdom, spam now accounts for 68.8 per- cent of all e-mail traffic worldwide. Following the most recent scandals, many users are rightly asking themselves whether encryption is even worth the effort. Accor- ding to a report in the Guardian, Microsoft of all people has revealed itself to be the fox guarding the hen house, helping the NSA, America‘s most secret of intelligence services, to circumvent the encryption of data by those using its services (2). As if MS Outlook didn‘t already have (hadn‘t already had) enough gaps in security – several years ago, even the German Federal Office for Information Secu- rity felt compelled to issue a warning about using the American software giant‘s e-mail programs (3). That has not done MS Outlook‘s popularity any harm. Irrespective of all safety concerns, it is im- possible to imagine our working lives without Outlook & Co. According to a study conducted by the Fraunhofer IPK together with CONTACT Software and the VDI, even engineers, who should actually be undertaking more creative work, spend more time on communication and coordinating development projects than on their core tasks (4). Their most important IT tool is therefore not the CAD system but rather the e-mail program, which many of them still use to exchange sensitive informa- tion such as CAD and product data as well as key business figures despite the strict security measures in place in the companies. Simple solution required What many users might not know is that even encrypting e-mails will not provide suf- ficient protection for their intellectual pro- perty. The encryption mechanisms included in e-mail programs normally only encrypt the e-mail body but not the attachments, which often contain confidential information. This not only applies to CAD data, which is full of design know-how well worth protecting, but also to sensitive simulation data (e.g. from crash tests) or copyright protected graphic, image, music and video files. These files often reach a size that would bring any e-mail pro- gram to its knees, i.e. it is either impossible to send them as an attachment, or they can only be sent distributed over multiple e-mails. You have to wonder why even at larger companies so much data is still being ex- changed without any security measures whatsoever. Probably because things usual- ly have to be done quickly, and all the other mechanisms are more complicated to use than the e-mail program that all of us can use in our sleep. Therefore, a key requirement for any secure data exchange solution is that you can use it just as easily as you do your e-mail program. Or better yet, you use it exactly like you do your e-mail program. This is a requi- rement that PROSTEP AG intends to meet with its new OpenDXM GlobalX Outlook integration component. Fully integrated in MS Outlook From the users‘ point of view, the data ex- change client is fully integrated in the Out- look user interface. The only difference is two additional buttons, one for sending large files and the other for forcing files of any size to be sent via OpenDXM GlobalX. The first func- tion is actually redundant since the rules of OpenDXM GlobalX allows flexible use while remaining highly secure.
  • 4. PLM IT REPORT No. 1, 2014 4 D ATA A N D P R O C E S S E S the data exchange platform specify that once data exceeds a certain volume, it is automa- tically exchanged via OpenDXM GlobalX. The problem is that Outlook‘s standard „Attach File“ function needs several minutes to deter- mine that a file containing multiple gigabytes of data is much too big to send by normal e-mail. Users can overcome this obstacle with the „Attach Large File“ function. But the OpenDXM GlobalX Outlook inte- gration cannot only be used to automatically „redirect“ files that exceed a certain size to the data exchange platform. The system ad- ministrator can with little effort define rules, for example that files with a certain extension are always to be sent via OpenDXM GlobalX, i.e. are to be sent in encrypted form. Or files being sent to people in countries that are not so strict when it comes to know-how protec- tion. Thanks to the second button, users also have the option of using OpenDXM GlobalX to send any file to any user, even if none of the defined rules automatically applies. Activating spontaneous recipients From the recipient‘s point of view, down- loading the data will vary depending on whether or not he is also using the OpenDXM GlobalX Outlook integration. In either case, he will be notified that data is available for download. This message can include the body of the original e-mail or not – depending how the company involved has configured the so- lution. If the recipient is not using an Out- look integration, he will have to log on to the OpenDXM GlobalX portal, which opens auto- matically when the link in the message is cli- cked, using his password to access the down- load. If he is also working with the OpenDXM GlobalX Outlook integration, downloading is even easier – all he needs to do is click on the file attachment in the OpenDXM GlobalX mes- sage; he can then download and save the file as usual using Outlook. In this case, additio- nal authentication on the OpenDXM GlobalX portal is not necessary. An interesting question is what happens if the user sends files to a recipient who is not yet known in the OpenDXM GlobalX databa- se. A company can define a uniform template for this spontaneous, or ad hoc, exchange process which automatically generates a temporary account, possibly with restricted user rights, for the recipient. In this case, the recipient not only receives a message about the data that is available for downloading but also two other e-mails: one containing his user ID and a second containing a tempora- ry activation link prompting him to specify a password for access to the portal. The solution is so flexible that it is even possible to define personal encryption with a public and a private key ad hoc. In this case, the files are encrypted using recipient‘s pu- blic key. The recipient is the only person who possesses the private key needed to decrypt them. A wizard will help him generate the pri- vate key during the course of an online sessi- on. The applet prompts him to define what is referred to as a „keystore“ and specify where the private key is to be stored, for example on a USB flash drive. It also prompts him to protect access to the keystore with a separate password. Personal encryption using keys of up to 4096 bits ensures the highest possible level of data security. Secure data exchange platform OpenDXM GlobalX is a highly secure data exchange platform that is normally set up by the company who owns of the collabo- ration projects; but it can also be hosted by PROSTEP AG or another provider. It is nor- mally installed in what is referred to as the „demilitarized zone“, i.e. between the inter- nal and external firewalls of the company in question on a central server to which only system administrators have access, which allow them to define the profiles for the ex- change partners and the rules for the data With OpenDXM GlobalX from PROSTEP, encrypted data exchange is as easy as sending an e-mail.
  • 5. exchange process. In addition, the encryp- tion mechanisms are stored on the server, which also performs any necessary proces- sing, such as virus checks, forwarding data to backend systems or data conversion. The data, which is encrypted at all times, can be placed in an OpenDXM GlobalX File- Vault on decentralized servers to optimize data traffic over large distances. This means, for example, that the American subsidiary of a German company makes the data available to a project partner in the USA locally even though the partner has to log on to the cen- tral server in Germany in order to download the data. This architecture offers the advan- tage that the OpenDXM GlobalX server can be operated in a country with strict data protec- tion regulations, where intelligence agencies cannot simply demand that the keys be han- ded over – as is the case in the USA, for ex- ample. Without the keys, the encrypted data in the remote FileVaults is of no use to them. The data to be exchanged is encrypted using public-private key encryption when it is uploaded to the platform. In the case of normal encryption, OpenDXM GlobalX is the master of the public and the private key and ensures that the data is automatically decryp- ted when it is downloaded so that the autho- rized recipient can read it. If, on the other hand, the person sending the data decides to use personal encryption, the recipient must have a private key to which only he has ac- cess in order to read it. In this case, the intel- ligence services would have to devote even more time to cracking the encryption since they will need the private key to do this and it is stored password protected on the user‘s storage medium of choice. Documentation of exchange operations Sending data via the exchange platform has the additional advantage that all ex- change operations are logged and can thus be used at any time for audit purposes. Alt- hough OpenDXM GlobalX does not store the 5 PLM IT REPORT No. 1, 2014 DATA AND PROCESSES The advantages: transfer of very large files with Outlook, full documentation, automatic compliance with company- specific rules, highest possible level of security for confidential documents and easy operation. Highest possible level of data security even when exchanging data with Outlook.
  • 6. attached file, it does store all the other information that belongs to each individual data exchange ope- ration. When using the OpenDXM GlobalX integration, even the text body of the original e-mail is also archived. The text body is not stored as a document but written directly to the database instead, thus ma- king it possible to perform full-text searches according to sender, reci- pient, subject or other search cri- teria. The user, of course, only sees the e-mails that he himself has re- ceived or sent via OpenDXM GlobalX – a group leader or system admini- strator, on the other hand, have an overview of all the exchange opera- tions for a certain project. The integration of the data ex- change platform OpenDXM GlobalX in MS Outlook not only provides the highest possible level of data secu- rity and protection for file attach- ments but also allows the exchange operations to be traced at all times. Acceptance of the solution depends largely on the fact that it is actually invisible to the end user. The ability to define uniform, enterprise-wide rules for handling sensitive data is in case of doubt and in the long run more important than getting the better of the data spies at the NSA and Co. (1) see http://royal.pingdom. com/2013/01/16/internet-2012-in- numbers (2) see www.theguardian.com/ world/2013/jul/11/microsoft-nsa- collaboration-user-data (3) www.welt.de/wirtschaft/web- welt/article5918620/Bundesamt- warnt-jetzt-auch-vor-Outlook.html (4) www.ingenieur.de/Arbeit- Beruf/Management/Ingenieure- Freiraum-fuer-Engineering-Kon- struktion Michael Wendenburg, Sevilla (www.wendenburg.net) PROSTEP AG, Darmstadt, Phone +49 6151 9287-0, www.prostep.com The OpenDXM GlobalX Outlook integration is now available. w w w . p r o s t e p . c o m PROSTEP AG Dolivostraße 11 64293 Darmstadt Phone +49 6151 9287-0 Fax +49 6151 9287-326 PROSTEP France S.A.R.L. Toulouse & Chassieu 7 rue des Cyprès F-69680 Chassieu +33 478 908543 PROSTEP AG Dolivostraße 11 64293 Darmstadt Phone +49 6151 9287-0 Fax +49 6151 9287-326 PROSTEP France S.A.R.L. Toulouse & Chassieu 7 rue des Cyprès F-69680 Chassieu +33 478 908543 PROSTP INC 300 Park Street, Suite 410 Birmingham, MI 48009 Phone: +1 248 247 1007 Fax: +1 248 247 1011 US Toll Free: 8-PROSTEP-01 (877-678-3701) Fax: 8-PROSTEP-02 (877-678-3702)