ITAR compliant file sharing

Solutions for ITAR compliant file sharing and collaboration

ITAR is one of the most stringent sets of regulations on the planet. Cocoon Data’s granular front-end controls, and full audit capabilities, ensure adhering to the file-sharing and collaboration portions of the ITAR regulation are easy. Cocoon Data is deployed in the FedRAMP Certified AWS GovCloud (US) regions, satisfying the stringent requirements of ITAR for physical infrastructure management. This pairing of technology helps your organization meet the need for an ITAR compliant file sharing capability.

shutterstock
NLST
NLST
ITAR
ISO
CMMC
FIPS
GDPR
CCPA
HIPAA
FERPA

What is ITAR?

The International Traffic in Arms Regulations (ITAR) is a very strict set of United States regulations that controls the export of defense and military technologies. ITAR is in place to protect U.S. national security and foreign policy.

Cocoon Data allows you to seamlessly protect, store and share your sensitive ITAR regulated data in the cloud while providing a full audit history of every user. Cocoon Data is a turnkey file sharing and collaboration solution, with one simple, low monthly price point which affords you:

 

  • A Cocoon Data tenancy in the FedRAMP Certified AWS GovCloud
  • 24×7 Maintenance and Support
  • 1 TB of data per organization

How Cocoon helps you achieve compliance with ITAR

Skilled personnel

All Cocoon Data FedRAMP Certified AWS GovCloud tenancies are maintained by US nationals. Our professional team has decades of combined experience working in the cybersecurity industry and Armed Forces. We pride ourselves on delivering the product and services you need to assist with compliance.

shutterstock
Encryption

Encryption

Cocoon Data secures every file with its own unique encryption key generated by a FIPS 140-2 Validated / NIST CVMP Certificate #3514 cryptographic algorithm. Files are encrypted in the browser and stored securely in AWS GovCloud (US). The Cocoon Data product offers true end-to-end encryption to secure your data.

Access controls

Some of the world’s most cutting edge technology in terms of defining access controls which protect your data is at your fingertips. Cocoon Data, and its proprietary patented technology ‘Secure Objects’, gives data owners granular controls to protect your data, define access policies and key management at the individual file level.

Confident engineer
Geofencing

Geofencing

Draw a perimeter around any point on Earth and create a digital fence to protect your data. Our Geofencing feature allows you to lock your data to a physical location to add an additional layer of security. Once you lock your sensitive data to a location on the map, Cocoon Data will not allow access to that data outside of the physical boundaries you set. GPS and cellular triangulation make location tracking relatively simple, but is not required with our approach. Network infrastructure of the internet connection of a user is all we need to determine the location and protect your data.

Auditing

Keeping a record of data access is critical for compliance. TheCocoon Data product and its fully featured auditing capabilities give you what you need to know the who, what, when and where as it relates to your data.

shutterstock
Whitelisting

Whitelisting

Lock your data to trusted persons and organizations. Our Whitelisting can prevent accidental, or intentional, data leaks by defining organizational domain; ie only@dept.gov.

Customer reviews

The Hon. Christopher Pyne

“As we all transition to work-from-home arrangements, it is more important than ever to ensure our information is protected. Cocoon Data’s cloud file sharing service is second to none!”

The Hon. Christopher Pyne

Former Australian Minister for Defence

N.J.RENTON
UNIVERSITY OF MICHIGAN
Dyneema
Arnprior
REDHILL HOSPITAL