Digital Rights Protection

Today's organizations regularly store sensitive information on corporate networks, often for workgroup collaboration. It is crucial that these files are secure when stored on the network and while in transit, while maintaining seamless access to these files for the trusted workgroup. And doing so without introducing any administrative burden to the workgroup.

Entrust's network folder encryption solution, Entrust Entelligence Group Share, helps address these issues by providing automatic, transparent and persistent encryption of sensitive data. Entrust Entelligence Group Share uses patented group key technology, which centrally tracks and controls access to data by workgroup members, enabling organizations to quickly and easily make permission changes as their organization naturally evolves, without adding a layer of administrative effort.

The platform, which can work with or without PKI technology, also has a powerful audit trail, enabling regulatory compliance. Not only for network folders, Entrust Entelligence Group Share also helps organizations transparently and automatically encrypt sensitive files and folders residing on desktops, laptops and removable media devices such as DVDs and USB flash drives.




Entrust Entelligence Group Share provides organizations with an efficient, manageable security solution that allows workgroups to collaborate and share sensitive information securely across corporate networks. This additional layer of security helps address various privacy standards such as PCI DSS, SOX and HIPAA.


  • Zero-touch folder administration enables administrators to perform the same operation on multiple folders in a single operation
  • No need to re-encrypt data when making permission modifications

  • Easy data recovery

  • Separates document ownership role from IT management


  • Automatically encrypts data stored on corporate networks

  • Helps protect shared data stored on file servers, desktops, laptops and removable media devices

  • Persistent encryption maintains security regardless of where it is copied, moved or stored

  • Enables you to securely share intellectual property while complying with regulatory requirements

  • Limited lifetime on decryption keys

  • No need for public key infrastructure, but can leverage one if available

  • Leverages standard Windows authentication


  • Transparent operation does not affect the way users work

  • Folder owners can leverage existing Active Directory workgroups, or create their own

  • Can be managed separately from your IT help desk

  • Designed to operate with various backend file systems

Centralized Audit

  • Centralized audit of all activities related to protected folders on corporate networks

  • Tells administrator who is accessing what data, when and from where

  • Provides centralized audit of both folder access and changes to permissions

  • Enables regulatory compliance by offering proof-positive of data access