TRANSFER YOUR DATA SECURELY
Securely Transfer, Share, and Archive Your Most Sensitive Data with Help of Google Cloud

TYPICAL TRANSFER GENERAL DEPLOYMENT
ENCRYPTION
WITHOUT
VPN
VPN
RISK-MITIGATION
FOR IN-SCOPE
DATA
DATA
Transfer General (TG) uses cryptography to empower data owners to securely distribute or archive
highly-sensitive data no matter where the data resides – in a data center or the cloud.
There is no need to set up virtual private networks thereby lowering overall data
transfer/distribution/archival costs.
TG provides all the benefits of using Google Cloud storage while mitigating risks associated with it.
TG is an ideal solution for organizations that deal with in-scope data.
SEE HOW IT WORKS

CHALLENGES
How to share highly-sensitive data securely with partners?
Transfer General helps data owners share highly confidential data securely with their partners no matter
where
the data source is located. The data is encrypted before it leaves the secure confines of your network. A
Google
Storage bucket acts as the distribution point. The data remains encrypted till it reaches its destination.
No
VPN is required.
How to archive in-scope data in a cloud storage bucket?
If you want to take advantage of cloud storage to lower your archival cost but are afraid to do so because
of potential security risks, then Transfer General can help. You will encrypt your data before it’s
uploaded, control your data encryption key, and automate transfers of your encrypted data into a Google
storage bucket.
How to transfer in-scope dara across cloud platforms?
Many times contractual obligations and/or compliance requirements necessitate that only encrypted data be
transferred from one cloud platform to another. This is not easy unless you are managing your own data
encryption keys. Transfer General can help you move encrypted data as our key management is not tied to
any cloud provider.
WHY CHOOSE US?
NO VPN
Transfer General empowers data owners to safely share the most sensitive data with a partner without setting
up a VPN.
ENCRYPTION
Transfer General lowers corporate liability exposure by encrypting data before it leaves the secure confines
of your network.
LOWER COSTS
Transfer General lowers data sharing/archiving costs by enabling organizations to use Google Cloud storage.
Only the encrypted data is stored in the cloud.
LARGE DATA
Transfer General helps to overcome corporate bandwidth limitations when sharing large data sets stored in a
data center server.
USE CASES
RESEARCH DATA DISTRIBUTION
When you attempt to share highly sensitive data stored on-premises in your data center, you face multiple
challenges:
Should you directly transfer the data to
mitigate potential data security risk?
Do you make use of cloud storage so you have to upload the data only once and
distribute it to multiple partners?
A direct transfer may not be possible depending on the size of the data and the corporate bandwidth at your
disposal.
On the other hand, using a cloud bucket may be very attractive, but you just don’t want to deal with an added security risk.
On the other hand, using a cloud bucket may be very attractive, but you just don’t want to deal with an added security risk.

Solution
That is where Transfer General comes in.
Transfer General will encrypt your data on-premises, allow you to maintain complete control over the data encryption key, upload your encrypted data to a Google Storage bucket, and act as your distribution center.
Since only the encrypted data is uploaded into the bucket, you will eliminate any potential data security issue stemming from a storage bucket misconfiguration or a rogue storage administrator.
You’ll be able to push the data stored in the bucket to multiple destinations where the data will be decrypted for your intended audience.
You’ll be able to deny access to the data at any time with help of built-in cryptographic techniques.
Contact us
Transfer General will encrypt your data on-premises, allow you to maintain complete control over the data encryption key, upload your encrypted data to a Google Storage bucket, and act as your distribution center.
Since only the encrypted data is uploaded into the bucket, you will eliminate any potential data security issue stemming from a storage bucket misconfiguration or a rogue storage administrator.
You’ll be able to push the data stored in the bucket to multiple destinations where the data will be decrypted for your intended audience.
You’ll be able to deny access to the data at any time with help of built-in cryptographic techniques.
ARCHIVAL OF ON-PREMISES DATA USING CLOUD STORAGE
Do you want to take advantage of cloud storage to lower your archival cost
but are afraid to do so because of potential security risks?
Transfer General can help overcome this issue.
Solution
You’ll be able to encrypt your data on-premises, control your data encryption key, and automate transfers of
your encrypted data into a Google storage bucket.
Since data stored in the bucket is encrypted and only you have access to the data encryption key, you can rest assured that no rogue storage administrator will be able to read your archived data in clear-text format.
Transfer General will also help you download your encrypted data and decrypt it within the safety of your network.
You can:
⦁ Schedule one-time or recurring transfer operations.
⦁ Delete existing objects in the destination bucket if they don’t have a corresponding object in the source.
⦁ Delete data source objects after transferring them.
⦁ Schedule periodic synchronization from a data source to the destination bucket based on file creation dates, filenames, and the times of the day.
Let’s discuss
Since data stored in the bucket is encrypted and only you have access to the data encryption key, you can rest assured that no rogue storage administrator will be able to read your archived data in clear-text format.
Transfer General will also help you download your encrypted data and decrypt it within the safety of your network.
You can:
⦁ Schedule one-time or recurring transfer operations.
⦁ Delete existing objects in the destination bucket if they don’t have a corresponding object in the source.
⦁ Delete data source objects after transferring them.
⦁ Schedule periodic synchronization from a data source to the destination bucket based on file creation dates, filenames, and the times of the day.
ARCHIVAL OF SENSITIVE DATA STORED IN A CLOUD SERVER
LET’S SAY:
1
A data analytics firm is collecting unstructured data from various pharmacies.
They will process the data using a third-party software and remove any patient information.
2
The data analytics company intends to analyze the remaining data to identify any adverse reactions and provide this information to pharmaceutical companies for their reference and use.
3
The patient information must be protected to comply with HIPAA regulations, therefore the company is using a secure cloud server.
4
The pharmacy uses SFTP protocol to upload the data, and the data analytics firm wants to ensure the security of the uploaded data as well as keep it for future reference.
TG can provide the necessary security features for the stored data.
The pharmacy can use SFTP to upload the data directly to the server, and TG will encrypt the data using AES before storing it.
The data analytics firm will process the data, generate reports, and then store the raw data in a cloud storage bucket using TG.
Solution
TG supports the SFTP protocol. The pharmacy will be able to upload the information directly to the server. TG
will encrypt the data before it is stored on the disk using the AES algorithm.
The company will use the third-party package to massage the data and generate reports. The company will then use the TG to upload the raw data into a cloud storage bucket.
Start for
free
The company will use the third-party package to massage the data and generate reports. The company will then use the TG to upload the raw data into a cloud storage bucket.
It’s important to note that only the encrypted data will be uploaded into the bucket and only the company will
have access to the data encryption key.
The data can be uploaded based on the following parameters:
⦁ On a one-time or recurring schedule
⦁ Delete existing objects in the destination bucket if they don’t have a corresponding object in the source.
⦁ Delete data source objects after transferring them.
⦁ Schedule periodic synchronization from a data source to the destination bucket based on file creation dates, filenames, and the times of the day.
If the need arises, the TG will download the encrypted data from the cloud storage bucket onto their server and decrypt it for further processing.
The data can be uploaded based on the following parameters:
⦁ On a one-time or recurring schedule
⦁ Delete existing objects in the destination bucket if they don’t have a corresponding object in the source.
⦁ Delete data source objects after transferring them.
⦁ Schedule periodic synchronization from a data source to the destination bucket based on file creation dates, filenames, and the times of the day.
If the need arises, the TG will download the encrypted data from the cloud storage bucket onto their server and decrypt it for further processing.
HOW CAN TRANSFER GENERAL HELP ME WITH DATA SOVEREIGNTY?
Transfer General is designed to help customers meet data sovereignty requirements. Here is how we can
help:
Does Google control/manage the data encryption keys?
Can Google change the data decryption policy?
Can the Google admin see the data in clear-text?
Can the Google admin change the data access policy?
Can the Google admin compromise the workload?
Can the customer set the data decryption policy?
Can the workload survive for an extended period without getting updates from the provider?
Can deployment be restricted to a specific region?
Can the workload be deployed on different cloud platforms?