PGP Encryption with Cornerstone

PGP Encryption with Cornerstone

PGP encryption uses a combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography to provide security for data communication and storage. This protocol provides confidentiality, key management, authentication, and digital signature support.

When you use Cornerstone PGP encryption, your encrypted data-in-motion immediately becomes encrypted data-at-rest. Your data never exists in an unencrypted state on your network. When the client uploads the file, Cornerstone generates a PGP encrypted packet and writes that to the disk in smaller blocks of data. Once the last block arrives, Cornerstone completes the file, generating the last PGP encrypted packet, writes and closes the file, and reports to the client that the file was uploaded successfully.

Cornerstone offers these PGP options:

  • Do PGP Encryption in Real-Time (synchronous) - Select this check box to encrypt your files in real-time (Recommended). PGP encryption is not enabled by default.
  • Use Events Management System for PGP Encryption (asynchronous) - Select this check box to use the events management system for PGP encryption. See the Events Management topic for more information.
  • PGP Keyring Folder - Use the browse button “...” if you would like to change the default location of the PGP Keyring folder.

Follow this link to a detailed QuickStart covering PGP encryption with Cornerstone, which covers:

  1. Using events to PGP encrypt or decrypt files
  2. Generating/creating PGP key pairs
    • Related Articles

    • PGP Encryption with Cornerstone

      PGP encryption uses a combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography to provide security for data communication and storage. This protocol provides confidentiality, key management, authentication, ...
    • 2019: Cornerstone MFT Server Release Notes

      Important Information Cornerstone MFT Server must be installed under an account that has full administrative rights to the computer on which the software is being installed.  To uninstall Cornerstone MFT Server, use the Add/Remove Programs feature of ...
    • RENAME timeout when using Cornerstone with StatsTrack

      Scenario: When using Cornerstone MFT Server 2019 in conjunction with the StatsTrack reporting system, you may experience a delay or timeout when attempting to rename a file or directory using either an SFTP/FTP client or the WebUI browser interface. ...
    • High Availability Configuration with DMZedge and Cornerstone

      Any number of Cornerstone servers can be configured to work in a clustered environment where each server shares the same database and file system to access files. Each Cornerstone server can also be configured to communicate with one or more ...
    • NX: Cornerstone MFT Server system requirements

      The following lists the minimum system requirements for running Cornerstone MFT Server - NextGen Edition Supported Operating Systems Windows Server 2012 (and R2) and later, all 64-bit editions (32-bit is not supported) Windows 10 Pro and later, ...