Services for Users

  • Secure File Storage
  • Secure File Sharing
    • File sharing within ResVault is Made simple and secure through the utilization of public/private key encryption
  • Group Directories and Group Share
  • Detailed Group Management
  • Ad-hoc Sharing
  • File History
  • Cryptographically Isolated Teams
  • Vault to Virtual Machine Transfer
  • Virtual Machine to Vault Transfer
  • Secure Virtual Machines (single and multi-user)
    • A key component of ResVault is the ability to launch virtual machines on behalf of users within the secure environment. All VM connections are done through in-house forwarding written directly on top of OpenSSL’s TLS functionality, which is fully FIPS 140-2 compliant and actually allows for more access control than SSH did, meaning users have access to explicitly specified VM features and nothing more. All user interaction with VMs is monitored and logged by ResVault just like other areas of the system. The system supports both Linux and Windows images with varying available memory and number of CPU cores. Administrators have the ability to manage VM use, but have no access to the VM itself.
  • Shared Encrypted Drives
  • Project Tagging
    • Projects are a security tagging mechanism that allow for any type of resource within ResVault (file, directory, drive, VM) to be tagged and associated with one project tag. Once a resource has been tagged by a project level, the way it can be manipulated or accessed is significantly restricted. This is based on the custom security levels associated with the project.

  • Security levels and Certificates
  • Mailboxes
    • There are many situations in which researchers collaborate with those outside their internal system, leaving many opportunities for files to be exchanged insecurely during communication. ResVault offers a simple collaboration tool that enables ResVault users to send the address of an encrypted ResVault folder and their public key to individuals outside the system, using the mailboxes service. Files can then be encrypted on the outside collaborator’s computers using the public key, and the encrypted files can finally be uploaded worry-free to the mailbox, where only the user with the appropriate private key can decrypt them.
  • Large Data Transfer to User’s Vault
  • Notifications
  • Internal Help Tool