End-to-End-Encrypted Team Communication & Collaboration Tools

This post is a collection of my notes about my search for secure collaboration and communication tools for smaller organizations, specifically vast limits. I will update it from time to time.

Bird’s nest in a stationery sign by Milan B under CC

What is This About?

In an ideal world, all our data and communications would be stored and transmitted end-to-end encrypted, i.e., in such a way that (cloud service) providers never see unencrypted data. Realistically, end-to-end encryption is only available for a subset of the services we use and need.

Requirements

Which features are we looking for? What functionality do we need?

  • End-to-end encryption with keys managed by the customer
  • UX: user experience and stability
  • SaaS: application hosted and managed by the vendor

Text & Audio/Video Chat

Mattermost

Netsfere

  • Company website
  • Cloud-based enterprise messaging service
  • The free plan looks good already. The paid Enterprise plan adds AD synchronization via an agent to be installed on domain controllers.

Element (Formerly Riot)

  • Company website
  • Free and open-source software built on the Matrix backed by a well-funded organization
  • Available for self-hosting or as SaaS
  • Mobile app: good reviews on Google Play and the App Store
  • Audio/video calls use WebRTC which is not end-to-end encrypted.
  • Lack of admin controls.

Stackfield

  • Company website
  • Text chat and team collaboration as SaaS or on-premises solution
  • Functionality includes task management, time tracking, and event scheduling
  • Currently 1:1 calls only, no group calls with audio/video

Wickr

  • Company website
  • Zero-trust communications as SaaS (Wickr Pro) or on-premises solution (Wickr Enterprise)
  • Supports SSO via OpenID Connect (requires Wickr Pro Gold plan; Google and Okta specifically listed as compatible; configuration is not documented)

Wire

  • Company website
  • Fast-growing startup focusing on secure communications for enterprises
  • Usability of the encryption and security features seems to be good
  • Mobile app: the reviews on the Play Store and the App Store are not great

File Storage, Sharing and Sync

  • Company website
  • Presents cloud storage to the OS as a virtual drive
  • Adds a logical layer, works with most cloud storage providers (including Amazon, Azure, Google, Backblaze)
  • Lack of admin controls
  • The Windows client’s UX is so-so

pCloud Business

  • Company website
  • Swiss-based cloud storage that offers end-to-end-encrypted and non-encrypted folders in the same account
  • The feature set seems to be mature
  • No ACLs with encrypted folders, but team members can be invited with different permission levels (source): view, edit, manage rights

Sync.com for Business

  • Company website
  • End-to-end encrypted file storage and sharing for teams
  • Inexpensive, good feature set
  • Supports ACLs through team shared folders (no nesting or changed permissions on subfolders)
  • Only one sync folder (directories outside the sync folder can be synced by creating symbolic links; this is not officially supported, though)
  • Not everybody seems to be happy with the Android app

Tresorit

  • Company website
  • End-to-end encrypted alternative to the usual EFSS suspects
  • Good UX, reliability and sync speed (personal experience over several years)
  • What’s missing: ACLs (permissions) per folder

Comments

Related Posts

Standard Notes: a Note-Taking App with Client-Side Encryption

Standard Notes: a Note-Taking App with Client-Side Encryption
Note-taking is one of those topics that appear to have been solved long ago, yet offer plenty of opportunity for new contestants. There are multiple reasons for that, but for me the number one is encryption. The major players, Microsoft OneNote, Evernote, and Google Keep, store your thoughts and ideas in plain text on any synchronized device as well as their cloud servers. In the age of hacks, leaks, and exploits it does not take much to conjure up scenarios where those thoughts become public knowledge all of a sudden.
Applications

Top 10 IT Security Tips for Individual Users

Top 10 IT Security Tips for Individual Users
This is a list of simple things that will protect you from nearly all the real-world IT security issues affecting individuals and SOHO users. 1. Install All the Updates What Should You Do? Enable automatic updates wherever possible Don’t use obsolete software versions Why Is It Important? Older software versions often have known security issues for which exploits are readily available. This means that even script kiddies can easily attack large numbers of users.
Security

Latest Posts

Scripted WordPress to Hugo Migration

Scripted WordPress to Hugo Migration
After having published in WordPress for almost 20 years, it was time for a change. This site is now rendered by Hugo, a static website generator built for Markdown content hosted in a Git repository. The migration from WordPress (HTML) to Hugo (Markdown) was far from trivial. Since I couldn’t find any tool for the job, I developed my own set of migration scripts that fully automate the migration process. You can find them on GitHub along with extensive documentation.
Website