Wednesday, December 30, 2015

Happy New Year

TeamDrive wishes its loyal customers and friends a peaceful Holiday Season and a Happy New Year.

In 2016 our team will continue to enhance the secure collaboration and file synchronisation solution TeamDrive EFFS.  We listend to our customers and we have a load of new features coming this year, which will make the work even more productive and keep it easy to use.

End to End encryption and our Zero Knowledge design will continue to stand out for enterprises, small businesses and private users.

We cannot make the world better, but we can provide tools which protect your privacy while enjoying the comfort of the internet!

We wish you a peaceful 2016

Friday, August 21, 2015

Wuala Cloud Storage Shutting Down

Wuala has announced they are shutting down their servers and closing their doors. The real question here is, why? Wuala emerged as one of the pioneer sync and share companies to provide secure cloud storage services. Some time ago they discontinued providing free clients and since then there have been many unanswered questions. Were they hacked? Was their owner, Seagate, forced by U.S. authorities to stay away from zero-knowledge services?

The demand for zero-knowledge cloud services is growing at an exponential rate and there are really only a few alternatives for business users to choose from. Many products promise security. Most lack full end-to-end encryption while others are simply too complicated to use in a team.

TeamDrive is well positioned as a new home for Wuala users. Albeit it is a zero-knowledge cloud service and provides complete end-to-end encryption, TeamDrive is the only supplier who delivers a free choice of servers. Customers have the flexibility to combine multiple servers at will. Private use of TeamDrive Professional clients is free for anyone. The clients themselves have zero restrictions, however, a fee is charged for cloud storage beyond 2 GB and support. In addition these clients support plain, vanilla WebDAV servers as an alternative storage provider to the TeamDrive cloud or other TeamDrive hosting servers. As a European service provider all encrypted data are, per default, stored in the EU. TeamDrive has been around since 2009 and all of its provided services have been audited and are recommended by the Independent Regional Centre for Data Protection of Schleswig-Holstein, Germany, (a German governmental agency, which focuses on privacy protection).

 Moving Data from Wuala to TeamDrive is a simple process.

 1.) Please download the content in your Wuala account and safely back it up to your device, as instructed on the Wuala website. The content will be stored in a folder structure on your hard drive.

 2.) Download and install the TeamDrive client and register a new account. 3.) Right-click on one the Wuala folders in your file system and use the context menu "Convert to Space" to convert the Wuala folder into a TeamDrive Space.

That’s it! Now you are all set. TeamDrive will now begin encrypting and uploading your data. You can now, also invite others to your new TeamDrive Space and share your data. You can also install a TeamDrive mobile client and access your files on the go. Accessing your data using your mobile device is also fully end-to-end encrypted, which is not the case with SpiderOak.

Thursday, June 18, 2015

German Lawyers Rely on TeamDrive

The German Lawyers Association (Deutscher Anwaltverein e.V. or DAV) represents roughly 68,000 lawyers and recommends the TeamDrive DAV solution to all of its members. The service is hosted in Germany and follows Germany's strict privacy protection regulations and laws.

The framework agreement between DAV, TeamDrive and Noris Network, as the technical partner, is intended to guarantee a consistent, efficient and legal solution. “Law firms and lawyers will have the certainty and comfort of not violating the interests of their clients when storing, synchronizing and sharing data and documents,” pledges TeamDrive CEO Volker Oboda. It is at all times ensured that confidential data are transmitted in encrypted form only and stored under specified conditions in a dedicated, high-security data center located in Germany.

The TeamDrive DAV solution is based on TeamDrive 4 technology; the data center operator, Noris Network, hosts an extremely flexible, robust and scalable server farm based on Ceph Object Store and includes load balancing and backup. The TeamDrive DAV solution was revealed at the 66th German Lawyer’s Day on June 11, 2015 and is now available for download from the DAV website.

Wednesday, February 25, 2015

Maintenance Update to prepare the TeamDrive 4 Launch in March

In preparation of our TeamDrive 4 Launch in March we do a Database Maintenance today Wednesday, 2015-02-25, 6:30-8:00am CET.

Sync of existing Spaces will continue to work.

During this time, the TeamDrive Registration Server won't be available for TeamDrive Clients or via the Administration Console. Running Clients will indicate that the Registration Server can not be reached (for example, the TeamDrive 3 Desktop Client has an LED-like indicator icon in the bottom right corner, which will turn from green to red in case the Registration Server cannot be reached).

During this time, the following Client operations will continue to work:
- Running Clients can still operate on their existing Spaces (e.g. adding/removing files, uploading new versions)
- Clients can create new Spaces and delete existing Spaces
- Creating Space invitations to users stored in the Client’s local addressbook

The following operations will be not be possible while the Registration Server is unavailable:

- Performing a login after having logged out of the TeamDrive Client
- Registration of a new device/Client
- Sending out Space Invitations to other users
- Changing the password or email address, requesting a temporary password
- Distributing comments on files via email
- Enabling/disabling the Key Repository

Once the maintenance work has been concluded and the Registration Server is reachable again, the Clients will proceed as normal and the notification icon will change from red to green again.

Wednesday, April 9, 2014

TeamDrive and the Heartbleed OpenSSL bug - Is my Data Secure?

In case you have not heard about it yet, a rather nasty security vulnerability in the Open Source cryptographic library OpenSSL has been discovered. Dubbed "Heartbleed", it can result in unwanted information disclosure on both ends of a communication channel that is encrypted with SSL/TLS (for more details, check the dedicated web site about this issue at

 How does this affect TeamDrive and your data?

The TeamDrive Client uses cryptographic functions provided by OpenSSL to perform local AES-256 encryption of your data before it is transmitted to a TeamDrive Server. Because the data has already been encrypted locally, the TeamDrive Client-Server communication does not establish an additional secure communication channel via SSL/TLS - this reduces the overhead and makes it easier to propagate data through proxy servers. Therefore we're not affected by this vulnerability here, as it only affects secure communication channels established via SSL/TLS.

However, there are two scenarios in which the TeamDrive Client establishes SSL connections:

  • If you need to access TeamDrive Spaces hosted on an SSL-enabled WebDAV server 
  • If you publish versions of a file on a TeamDrive Host Server that has SSL enabled for publishing (this requires a TeamDrive Professional Client license). Publishing via SSL is currently not enabled on the host servers of our public TeamDrive cloud, but may be enabled on TeamDrive Host Servers that you manage on your own premises.
 In both cases, the client will establish an SSL connection to the server, thus making it potentially vulnerable to this particular bug, if the server has been taken over by a malicious user. However, the server itself would have to be compromised beforehand and modified in such a way that it can be used to exploit this vulnerability. Simply running a server with an affected OpenSSL library does not automatically lead to any information disclosure here, but may provide a potential attack vector for gaining access to the server.
The TeamDrive Client's version of OpenSSL depends on the client version and platform. With the exception of Mac OS X and Windows, our Clients have been built against a bundled version of OpenSSL, which is currently at version 1.0.1 for the latest builds. We'll be releasing updated clients shortly to fix this bug.

By Lenz Grimmer

Tuesday, January 7, 2014

TeamDrive receives Amazon Partner Network Advance Technology Partner Status

by Volker Oboda, CEO TeamDrive

We are proud to announce that TeamDrive Systems received the status of Amazon Partner Network Advanced Technology Partner.

Amazon Partner Network Advanced Technology Partner logo

The entire TeamDrive team has worked hard to build and refine our secure and industry leading sync and share solution and this designation is an important milestone that reinforces our past and present achievements.

We also want to thank our numerous customers and users and are thankful for your continuing support. Your input helped us shaping and improving TeamDrive and made this possible.

For all those who have not used TeamDrive yet:
TeamDrive is a collaboration software and service to sync your files easily and securely with 256 bit AES end-to-end encryption using the TeamDrive cloud or your own server.

Download TeamDrive today and check out our web site for more information.

Tuesday, October 29, 2013

Die Geheimdienste haben uns verraten und verkauft!

Wie sollten sich Unternehmen in Zukunft verhalten?

von Volker Oboda, CEO TeamDrive

Kein Tag vergeht, an dem wir nicht mit neuen Horror Szenarien durch Edward Snowden informiert werden. Dabei geht es schon lange nicht mehr nur alleine um PRISM, Tempora oder XKeyscore. Es geht um die Willkür der Geheimdienste nach ihrem Ermessen zu entscheiden, was sie tun und lassen dürfen. Jeder von uns muss sich daher nun die Frage stellen, wie er in Zukunft mit dieser Bedrohung umgehen wird, die nicht von vermeintlich bösartigen Hackern ausgeht, sondern von denjenigen Einrichtungen, die den Auftrag erhalten haben uns zu schützen.

Unternehmen sind zum Handeln gezwungen

Neben Unternehmen, Behörden und anderweitigen Organisationen, die mit besonders sensiblen und personenbezogenen Daten arbeiten, ist jeder von uns im Besitz von kritischen Informationen die schützenswert sind. Angesichts der aktuellen Spionagediskussion, aber auch durch Angriffe sowohl im privaten als auch im geschäftlichen Umfeld, nimmt die Bedrohung stetig zu. Insbesondere im unternehmerischen Umfeld sind Daten maximal schützenswert.

Mobile Endgeräte und Applikationen sind in unserer mobilen Gesellschaft und der sich ständig verändernden Arbeitsweise und Kommunikation unter Mitarbeitern, Geschäftspartnern und Kunden nicht mehr wegzudenken. Die Herausforderung besteht darin, diese Kommunikation im Interesse aller Beteiligten unter allen Umständen zu schützen. Sensible Informationen und Unternehmensdaten haben in den Händen unberechtigter Dritter und Geheimdiensten nichts zu suchen. Diese Zugriffe gilt es zu unterbinden. Das gilt selbstverständlich auch für das Erstellen, Bearbeiten und Teilen mit vertrauenswürdigen Personen.

Konzepte wie „Bring Your Own Device“ (BYOD) haben in Unternehmen zu einer neuen Dimension von Schutzbedürfnissen geführt, die für jede Organisation eine besondere Herausforderung darstellt, um unternehmenskritische Daten und geistiges Eigentum bestmöglich zu schützen. Zudem verschärft ein unkontrollierter IT-Wildwuchs (Schatten-IT) durch Dropbox und anderweitige, bevorzugt private Cloud-Lösungen, diese Situation. Das führt zu einer immensen Bedrohung der Informationssicherheit in Unternehmen, wovon gleichermaßen böswillige Hacker und Geheimdienste profitieren. Nichts desto trotz müssen Mitarbeiter mit denselben komfortablen Technologien und Lösungen weiterarbeiten können. Aber das auf eine sichere Art und Weise.

Kontrolle alleine reicht nicht aus, SSL ist unsicher

Berufsskeptiker bekommen durch die aktuellen Diskussionen wieder Oberwasser und raten der Cloud den Rücken zuzuwenden und die Aktivitäten in der eigenen IT-Infrastruktur zu stärken. Kontrolle ist ein wichtiges Thema. Wer seine Systeme und Daten unter eigener Aufsicht betreibt hat mehr Kontrolle über die Prozesse und einen besseren Überblick darüber wo sich welche Informationen befinden. Bei diesen Diskussionen wird nur immer leicht unterschätzt, dass wir uns in einer globalen Welt befinden und, wie oben geschrieben, wir auf mobile Endgeräte und Applikationen angewiesen sind, um die täglichen Geschäfte zu führen.

Mitarbeiter müssen sich mit ihren Endgeräten, Daten und Informationen also trotzdem weiterhin frei bewegen können, obwohl die Kontrolle in den Händen der eigenen IT-Abteilung liegen soll. Ein wichtiger Schritt, den jedes Unternehmen aber insbesondere jeder Anbieter von IT-Services schon seit Jahren hätte berücksichtigen müssen ist die Verschlüsselung. Es ist schon als ein Armutszeugnis zu bezeichnen, das Anbieter plötzlich damit beginnen, ihre Systeme kryptographisch zu härten und dies sogar noch als Mehrwert an ihre Kunden zu verkaufen. Sicherheit ist kein Mehrwert. Sicherheit ist ein zentraler Bestandteil eines jeden Produkts und das nicht erst seit Edward Snowden. Und dazu gehört Verschlüsselung.

SSL-Verschlüsselung ist unsicher

Hierbei darf jedoch eines mittlerweile eines nicht vergessen werden. Die NSA und der GCHQ haben einige Verschlüsselungstechnologien, die im Internet eingesetzt werden, unterwandert, darunter SSL . Das bedeutet, dass sämtliche Anbieter, die ausschließlich auf die SSL-Verschlüsselung setzen, als unsicher einzustufen sind. Einzig und allein der AES 256Bit Verschlüsselungsstandard gilt weiterhin als sicher. Schätzungen ergeben, dass erst im Jahr 2018 die technischen Möglichkeiten vorhanden sind, um eine AES 256Bit Verschlüsselung zu knacken . Die Dauer hängt zum Teil ebenfalls von der Stärke des gewählten Passworts ab. Sicherheitsexperten empfehlen eine Passwortlänge von mindestens 20 Zeichen und dabei eine Kombination aus Klein- und Großbuchstaben, Zahlen und Sonderzeichen zu wählen.

End-to-End Verschlüsselung ist unumgänglich

Trotz aller Versprechungen nützt eine Verschlüsselung nichts, wenn der Anbieter über den Schlüssel verfügt, mit dem er Zugriff auf die verschlüsselten Daten erhält. Aus diesem Grund führt kein Weg daran vorbei, dass ausschließlich der Nutzer über den privaten Schlüssel verfügt und die Daten auf dem lokalen System des Anwenders verschlüsselt werden und anschließend über eine verschlüsselte Kommunikation auf die Server des Anbieters übertragen werden, wo diese ebenfalls verschlüsselt gespeichert werden. Der Anbieter darf zu keinem Zeitpunkt die Möglichkeit haben, den privaten Schlüssel wiederherzustellen und auf die Daten Zugriff erhalten.

So sieht das auch New Age Disruption Analyst René Büst . Er hält die Thematisierung der Kontrolle über die Daten für wichtig, macht aber darauf aufmerksam, das zwangsläufig früher oder später extern kommuniziert wird und eine harte End-to-End Verschlüsselung dafür unumgänglich ist. Büst empfiehlt daher auf folgende Eigenschaften bei der Sicherheit respektive Verschlüsselung zu achten:

  • Advanced Encryption Standard – AES 256 für die Verschlüsselung der Daten.
  • Diffie-Hellman und RSA 3072 für den Schlüsselaustausch.
  • Message Digest 5/6 – MD5/MD6 für die Hash-Funktionalität.
Weiterhin macht Büst deutlich, dass die Bedeutung der End-to-End Verschlüsselung der gesamten Kommunikation immer stärker zunehmen muss. Das bedeutet dass der gesamte Prozess, den ein Nutzer mit der Lösung durchläuft, von Anfang bis Ende durchgehend verschlüsselt ist. Das beinhaltet u.a.:

  • Die Benutzerregistrierung
  • Die Anmeldung
  • Den Datentransfer (Versand/ Empfang)
  • Übertragung der Schlüsselpaare (Public/ Private Key)
  • Der Speicherort auf dem Server
  • Der Speicherort auf dem lokalen Endgerät
  • Die Sitzung während ein Dokument bearbeitet wird

Wie sich Unternehmen verhalten sollten

Das Zusammenspiel von Vertrauen und Sicherheit wird immer wichtiger. Allerdings baut ein Anbieter nur Vertrauen auf, wenn er sich öffnet und seinen Kunden technische Einblicke gewährt. Diese Offenheit ist bei vielen IT-Anbietern nicht gegeben, wodurch diese berechtigterweise in der Kritik stehen. Unternehmen müssen aus diesem Grund einen Anbieter finden, der keine Geheimnisse hat und bereitwillig mit seinen Kunden spricht. Was sollten Unternehmen neben dem Aufbau von Vertrauen weiterhin beachten:

  • Gewinnen Sie Kontrolle über ihre Daten und Systeme zurück.
  • Bauen Sie vertrauen innerhalb ihrer Organisation und zu ihrem Anbieter auf. Das kann über eine gute Beziehung aber auch über Verträge entstehen.
  • Ziehen Sie ein Hybrid Szenario in Betracht, um Ihre Mitarbeiter auch bei ihren mobilen Tätigkeiten zu unterstützen.
  • Ihre Mitarbeiter, Kunden und Partner sollten weiterhin die Möglichkeit erhalten sicher(!) auf Daten und Informationen zugreifen zu können.

Was Sie unter allen Umständen berücksichtigen sollten sie die vollständige Kommunikation End-to-End Verschlüsselung und die Vermeidung von Medienbrüchen bei der die Verschlüsselung unterbrochen wird. Identifizieren Sie zudem sichere Verschlüsselungsverfahren und berücksichtigen Sie diese bei der Ihrer Anbieterauswahl.


Intelligence Agencies Sold Us Down the River

How should enterprises proceed in the future?

By Volker Oboda, CEO TeamDrive

With every passing day we hear more and more horror stories stemming from the eye-opening information we received thanks to Edward Snowden’s leaks. Lately, the stories have not only been about PRISM, Tempora or XKeyscore, but, lately, the stories have revolved around the arbitrariness of the intelligence agencies and their decision to act at their own discretion in terms of what to and what not to do and allow. Each and every one of us needs to ask ourselves, “How can we deal with a threat like this? Not one coming from an alleged malicious hacker, but, instead, a threat coming from those agencies whose sole mission is to protect us and our privacy.

Enterprises Forced to Act

Besides government offices and agencies, enterprises, and any and all other organizations who work with particularly sensitive and personal data, each and every one of us possesses information we deem critical and worth protecting. In the face the current debates on espionage, whether based on attacks on data in personal or business environments, the overall threat continues to rise and, of course, data in business environments are particularly worth protecting at a maximum level.

Today’s mobile society is constantly changing and improving the way we work and communicate with one another. At this point it is almost hard to imagine business partners, coworkers and customers alike communicating without mobile devices and mobile applications. The overarching challenge here consists of how to successfully secure the communication in everyone's interest and at any price. Sensitive information and business critical data have no place in the hands of unauthorized third parties, intelligence agencies or, for that matter, even random standard users. It is necessary to prevent unwanted access no matter who the unauthorized person is. Naturally, this also applies to the creating, editing and sharing of data with a trusted third party.

Concepts like “Bring Your Own Device” (BYOD) have led to a new dimension of, and need for, privacy protection within the enterprise. It has also allowed organizations to meet new and existing challenges to secure business critical data and intellectual property. In addition, the uncontrolled growth of IT security holes (shadow-IT) due to Dropbox, and other preferred personal cloud solutions, cause this situation to be even more nerve wrecking.

This, in turn, leads to an increased threat to an enterprise’s ability to securely protect its critical information and data while at the same time creating a beneficial situation for both malicious hackers and intelligence agencies alike. Nevertheless, employees should continue to work with the same comfortable technology and solutions, but in a more secure manner.

Just to Control is Not Good Enough. SSL is Unsecure

Professional skeptics have once again gained the upper hand, due to the current security debates, and advise users to turn their backs on the cloud and, instead, strengthen their own IT infrastructures. Control is an important issue. Enterprises that operate and supervise their own data and systems have more, if not total, control over the processes that take place and they also have a better overview of where their data is located. However, these debates underestimate just how much of a global world we are living in and how much we rely on mobile devices and applications to run our daily business.

This means employees still need to be able to move about freely with their devices, data and information, while having the control lie in the hands of the enterprise’s IT department. An important factor each enterprise, in particular each vendor of IT services, needed to consider for years is encryption. It is evidence of incapacity that suddenly, out of nowhere, vendors started to harden their systems cryptographically sell this as an added value to their customer! Security is not an added value! Security is a central component of each product and this expectation existed before the events of Edward Snowden. That includes encryption.

SSL-encryption is Unsecure

Here is something that should not be forgotten. The NSA and GCHQ infiltrated some of the best known encryption technologies used to secure common Internet data transfers, among them SSL .This means all vendors exclusively using SSL as an encryption standard should be now classified as unsecure. Solely, the AES 256-bit encryption standard is still secure. According to estimates, we will not have the technological capabilities to crack AES 256-bit encryption until 2018 . The duration also partially depends on the strength of the password. Security experts recommend to choose a password length of at least 20 characters and to use a combination of upper and lowercase letters, numbers and special characters.

End-to-End Encryption is Inevitable

Despite all assurances, encryption is useless if the vendor owns the key that allows access to the encrypted data. For this reason there is no way around the fact that the user should exclusively own the private key, the data is encrypted in the user’s local file system and is, afterwards, transferred via an encrypted communication channel to the vendor’s servers where it is also stored in its encrypted form. On no account should the vendor have the capability to restore the private key in order to access the data.

New Age Disruption analyst René Büst also sees it that way . He thinks who has control over the data is an important topic but, however, calls attention to the idea that sooner or later external communication will be necessary and hardened end-to-end encryption is inevitable. Büst recommends to pay attention to the following respective characteristics of encryption:

  • Advanced Encryption Standard – AES 256 to encrypt the data.
  • Diffie-Hellman and RSA 3072 for the key exchange.

In addition, Büst makes it clear that the meaning of the entire communication being end-to-end encrypted needs to be strengthened. This implies that the entire process a user passes through with the solution is encrypted from beginning to end. This includes:

  • The user registration process
  • Logging in
  • The transfer of data (sending/receiving)
  • The transfer of key pairs (public/private key)
  • The storage location on the server
  • The storage location on the local device
  • The session while a document is being edited

How Enterprises Should Act

The interplay of trust and security is becoming more important. However, a vendor only gains the trust of its users if it opens up and allows its technical insights to be transparent to the user. This type of voluntary transparency cannot be found with many IT vendors, whereby these vendors are justifiably criticized. For this reason, enterprises need to find a vendor that has no secrets and is eager to communicate with its customer. Besides building trust, enterprises should also consider:

  • Regaining control over your data and systems.
  • Building trust within your organization and your vendor. This can be established with either a good relationship or with contracts.
  • Considering a hybrid scenario to support your employees while they are mobile.
  • Continuing to offer employees, customers and partners the opportunity to securely access their data and information.

What should by all means be considered is the end-to-end encryption of the entire communication and the avoidance of media disruptions during the encryption. Moreover, to identify secure encryption methods and to consider these methods during vendor selection.


Thursday, September 5, 2013

TeamDrive SecureOffice: Seamless and secure document processing for smartphones and tablets

René Büst, Principal Analyst and Senior Advisor covering cloud computing, business technology and collaboration published an insightful report about TeamDrive SecureOffice which was just released a few days ago.

TeamDrive SecureOffice is a collaborative product between the data security experts at TeamDrive and the mobile office provider Picsel combining one of the most secure tried-and-true ways to sync and share files "TeamDrive 3" with one of the most downloaded mobile office solutions "Smart Office 2".

You can find out more about TeamDrive SecureOffice right here.

Here are some interesting excerpts:

"A sandbox provides seamless security on the device

Based on sandbox technology, shared documents never leave the secure environment provided by the application. Complete end-to-end encryption is initiated when employees send and receive files via mobile devices."

"For large companies, government agencies and any other organization working with particularly sensitive data, it is crucial to adapt to the mobile habits of employees and to respond to these habits with appropriate solutions. A first look at the Android version of the app displays how the seamless workflow of Picsel’s Smart Office for mobile devices in conjunction with TeamDrive’s cloud-based sync and encryption technology for business can help to achieve this goal."

You can read the whole article right here on

Monday, July 15, 2013

So, where do we go from here? The protection of our privacy must be a priority!

Tensions have somewhat subsided since the recent news about PRISM and Tempora rocked the globe. So, what’s next? Where do we go from here? Is this somewhat relaxed state truly a relaxed state? Or is it just the calm before the storm?

As we delve deeper into the labyrinth of data we find out there is a surprisingly large interest in corporate data, an interest level far greater than many would have ever imagined. But tell me, are we really surprised? Are we truly that naïve? Truth be told, at some point we all had that burning sensation in our stomachs; we all had that feeling that in some form or fashion we were being ‘observed’. Well, now it’s official! Yep! Right there in black and white! But what does this mean for us and our privacy? Should we throw away all we have worked for, trash years worth of technological developments and head back to the drawing board? I would think not.

The show must go on; the sprockets and the wheels must keep turning. In hindsight we can see where we went wrong; we can see where we put a false sense of hope and security for our privacy in the hands of wrong people; we can see where we did not take the time to be more aware and to better inform ourselves as to how our privacy is actually being protected. Let’s not make the same mistake twice. “Fool me once, shame on you; fool me twice, shame on me.”


We like to share everything.

The ease and practicalities of easily sharing data and information with one another is steadily increasing. The main cause of this is because we, as people, like, and sometimes need, to communicate with each other. On the one hand, we are just social beings. On the other hand, we need our communicative skills for use in the world of business to promote the exchange of ideas, information, developments, solutions and to find ways of implementing all of these factors in a timely and efficient manner. This, in-turn, leads to mountains and mountains of data that other parties presumably have interest in and who, as we have now found out, are casually given access. At this point, “We like to share everything”, as described on, is as much of a punch line as it is an advertising slogan, especially when it’s written in its terms of use that data will be released to security agencies. As written by the Guardian, “The NSA document indicates that it is planning to add Dropbox as a PRISM provider”. On top of that, why should the user feel safe and feel as if his/her privacy is protected when their data will supposedly be stored in an encrypted form by their provider who, incidentally, has the keys to decrypt their data? So whose data is it really when you don’t even have the keys to access your ‘own’ data? The provider owning the keys to your data interferes with your right to have access to the data at will.

Control is good. Integrated encryption is even better.

Given the current state of our digital privacy, one could also say that an end-user who only relies on an ‘encryption at rest’* approach is betting on the wrong horse. Eventually, the data will leave its storage location and be transmitted in an unencrypted form and without further security measures. Can you say, ‘disaster waiting to happen’? For this sole reason is why all end-users, companies and private users alike, trust and confidently rely on 100% end-to-end encryption. 100% end-to-end encryption provides the level of security needed to allow end-users to communicate and easily and confidently share private data with whomever they choose. This has been confirmed by the results of a recent survey. However, the truth of the matter is that not one single US-based provider can meet this requirement. At the moment, Wuala, from Switzerland, and TeamDrive, are the only companies able to provide this high level of security.

But, what does end-to-end encryption mean exactly? As the name states, the data are encrypted before leaving the user’s device**. This means that the data are transmitted to the server in an encrypted format and also reside on the server in an encrypted format. While the data are being transmitted back to the user’s device they remain in their encrypted state. The data are encrypted during their entire time away from the user’s device. Once the data returns to the user’s device it can only be accessed if the proper encryption keys are available and these reside with the user. Yes. The user is the only person with access keys to their data. There is no master key maintained by the service provider which means there is no way for them to decrypt the user’s data and allow access to them.

Legal space and trust are a key factor

What the above-mentioned survey also reveals is that the location in which the data are stored is of high importance. 92% of voters agree Europe is the safest and most trustworthy region worldwide to store data. America tallies up a measly 2% of the votes and weighs in behind Africa which managed to receive 4% of the votes.

With all that said, it is probably pretty clear which vendor should only come into question today. Right?

* The data is stored physically encrypted.
** With third party tools the data can also be stored in an encrypted form on the user’s device. The best way to ensure 100% security is to encrypt your data locally as well.

Saturday, March 16, 2013

“Sync & Share” - Business Continuity Management (BCM) Solution with TeamDrive

Another sample of utilizing the secure sync&share technology from TeamDrive was demonstrated by our reseller partner "No Limit IT-Services" at the CeBIT show in Hannover Germany earlier this month.  "No Limit IT-Services" presented a secure and cost efficient solution for the IT Contingency Plan (IT-Notfallplanung 2.0)

Detlef Schmuck, COO of TeamDrive and Thomas Stueber, Sales Director of Nolimit IT-Services at CeBIT 2013 in Hannover, Germany
TeamDrive makes it possible to replicate contingency plans, and other documentation, regarding risk factors in order for them to be readily available offline in emergency situations. More than ever, a company’s ability to act is determined by the constant availability of its data. The IT Contingency Plan, also a part of the Business Community Management (BCM), gains more and more relevance and importance in today’s business world. Utilizing appropriate safety strategies should therefore be a standard action. On the basis of synchronization, NoLimit IT has developed various solutions for  IT Contingency Plan solutions. The secure and reliable “Sync & Share” solution from TeamDrive offers the advantage that the data are automatically encrypted, using AES 256-bit encryption, before being uploaded. All this is done without the user having to worry or press any extra buttons. This ensures that no unencrypted data leaves the machine and that the data cannot be, under any circumstances, accessed by unauthorized persons. The synchronized and encrypted data are always available to you at any of your favorite workstations and even available for use offline. 

Wednesday, February 27, 2013

The US law enables the US government to snoop on Europeans’ data held with US cloud providers without needing to obtain a warrant.

The European Parliament has had a hearing regarding the privacy report on the US Foreign Intelligence Surveillance Act Amendment Act (FISAAA) -- AKA US spy law.

Here is the download link to the study of  European Parliament: Fighting cyber crime and protecting privacy in the cloud

This law enables the US government to snoop on Europeans’ data held with US cloud providers without needing to obtain a warrant.
We at TeamDrive are a secure European-based cloud synchronization provider who cares much for the privacy and security demand of our customers. 

Right from the beginning, security has been one of TeamDrive’s top concerns, for both our consumer and enterprise customers. The questions raised about the United States’ FISA act have focused the minds of Europeans keen to share, but only with those they chose. TeamDrive has confirmed that European cloud users want to have data stored under the EU banner, away from the prying eyes of the US government, and TeamDrive’s free choice of server and end-to-end encryption gives them added confidence.
We welcome the findings of European Parliament’s hearing, and we anticipate more news on enterprises banning US-based file-sharing and making TeamDrive their de facto standard.”
TeamDrive is an alternative to US cloud computing giants Dropbox, Box and Google etc. European companies that want to avoid being snooped on by the US government can trust TeamDrive. TeamDrive gives you a free choice of server, plus full end-to-end encryption, plus TeamDrive is based in Germany and is not subject to FISAA.

Tuesday, December 25, 2012

Merry Christmas and a Happy New Year 2013!

On behalf of the TeamDrive Team, we would like to take this opportunity to wish you all the very best for the Christmas Season and a healthy and prosperous New Year! It has been a great and exciting year for our clients and partners and we look forward to working with you all in 2013!

2012 was a huge year for TeamDrive with the release of TeamDrive 3 and the transition of all our customers to the next generation TeamDrive platform. The coming year will bring many enhancements in all aspects of TeamDrive. You can expect greatly enhanced mobile Apps and a growing TeamDrive eco system to support all your great ideas and to provide enhanced global services for private and secure cloud storage. TeamDrive ensures that your files and content will always always stay and remain under your personal control, our mission and promise for 2013!

Wednesday, October 17, 2012

Hamburg-Cloud and TeamDrive Scoop Coveted IT Security Award

The winners of the  IT Security Awards are announced (left to right): Detlef Schmuck, TeamDrive Systems GmbH, Maximilian Adrian, SAP AG, Ulrich Parthier, it verlag GmbH, Claudia Scholl, SAP AG, Juri Frommer, SAP AG, Stefan Strobel, Cirosec GmbH, Ofer Maor, Hacktics Corp. and Ralph Salomon, SAP AG.

We are proud to announce that yesterday we received the coveted "IT Security Award 2012" in the category "Web/Internet Security" at the 2012 IT-SA Security Expo in Nürnberg, Germany. The well-named jury awarded our solution as a private label product (“SmartSync”), hosted in the Hamburg-Cloud, providing a hosting service for companies, business customers and public services in Germany. These services are built to satisfy the government regulations for data security and privacy.
Detlef Schmuck presenting the awarded TeamDrive solution
Among us on the awards stand were Hacktics Corp., and SAP AG. SAP AG hauled in the Management Security award for their development of an IT Security Management Strategy that simplifies processes and increases efficiency in the management area. Hacktics Corp., also took a bow as they received the Innovation of the Year award for their development of the web application Scanner Seeker. 

About Hamburg-Cloud / IT-works! Consulting

Hamburg-Cloud provides Hamburg enterprises with a secure, redundant infrastructure for cloud computing business. High flexibility and availability, for instance the variety of data transfer options, increases work efficiency for corporate customers by allowing them to focus on their core business.

Thursday, May 31, 2012

We got it out! TeamDrive 3 GA is done! Desktop, iOS, Android all is available now.

New things sometimes take a little longer. We're growing at a rapid pace, and our commitment to simplicity and security is now reaching out to your favorite smart-phones on iOS and Android, too. Syncing your files among your different devices and with your co-workers or friends could not be easier. We thought you might be interested in knowing about some of the new features and our most recent developments:

- TeamDrive 3 for desktops (Win,Mac and Linux) is easier to use then ever. We spent it a new synchronization engine and changed the local database to SQLite. All together a reliable sync for the latest operating systems is guaranteed.  Try us out and download your free TeamDrive clients from our Website. Get up to 10 GB free hosted Cloud storage by just inviting new users into your spaces.

- TeamDrive 3 for Android is now available at Google Play. Sync your files from your Desktop to your loved mobile device and vice versa. As allays at TeamDrive all your files stay encrypted and the encryption keys remain in your possession. You can extent your private file exchange not to your smartphone.

- TeamDrive for iOS (iPad and iPhone) can now be downloaded from the Apple AppStore. Similar to all TeamDrive clients is the easy setup. You need a desktop client for now to start the mobile app. Just enter your username and password and you are all set. Invite yourself on the desktop or receive TeamDrive invitations from others. All invitations will pop up on all your devices, including smart-phones or tablets. You have access to all your files on the go. Select files for off-line use. You can upload pictures taken on the mobile device and you can edit files and upload it to your workspaces.

TeamDrive 3 will allow us to develop future functionality. We do have a lot of new things in the works. Under the hood there are many new things which are not visible yet. So stay tuned and enjoy the new this which are out today!

We love your feedback on Google+ or on Facebook.

Tuesday, March 6, 2012

New TeamDrive 3 Public Beta is available

We have been working extremely hard to push out this new release. There are lot of improvements to the user experience, stability, and synchronization technology. This is the basis for our new smartphone clients (iOS and Android) which we will ship in the coming weeks.

Wednesday, December 28, 2011

We wish you a Happy New Year 2012

An eventful year reaches its end and we do not want to miss the opportunity to thank you warmly for your cooperation, trust and support. 
The development of TeamDrive’s next generation kept us busy throughout the whole year. We look forward to the new version and the Smartphone App for iOS and Android. 
In the first months of the new year you will be able to experience TeamDrive 3.0.

We wish you and your families Happy Holidays as well as a prosperous New Year.

Your TeamDrive Team

Sunday, September 18, 2011

TeamDrive Grows Internationally - Finnish language and local hosting services available

Our TeamDrive partner Protacon Solutions Oy in Finland launches TeamDrive in finnish language combined with local storage this week. „TeamDrive is the perfect alternative to Dropbox for finnish people and companies, who want  to share and sync their documents easy and secure“ explains Olli Porkholm managing director of Protacon Solutions Oy. „The TeamDrive solution offers companies, students and families to collaborate freely over the Internet, maintaining full privacy and keeping their files stored in Finland!“
Protacon Solutions Oy is hosting the TeamDrive Cloud Services in their hosting facility in Jyvaskyla, Finland. With a finnish language version, TeamDrive and Protacon fulfil the special demand of finnish customers for ease of use and local support. The broad availability of Internet access in Scandinavia make it very attractive for companies to move their own servers into less expensive and easy scalable Cloud Services. The TeamDrive software let users continue to work on their local documents as before and adds full control and security when sharing over the Internet. „It is a pleasure to see the professionalism and passion the Protacon team invests in our partnership“ expresses Detlef Schmuck, COO & Co-Founder of TeamDrive Systems during the press meeting in Finland.

Finnish customers please explore the new finnish website

Tuesday, August 9, 2011

Award-winning! Data Protection Seal of Approval for TeamDrive Synchronisation Software in the Amazon Cloud

Finally we received the new seal of approval for privacy and data protection in TeamDrive.

The audits took much longer this time, as the Independent Centre for Data Protection in Germany, (ULD) certified TeamDrive’s high security standards for the first time in the Amazon cloud, too.

Our End to End encryption protects users privacy in the Cloud and on private servers. No server administrator or government authority is able to view and to disclose any stored information. Documents stay under the control of its users only. And all this is done by the client software automatically without any user interaction.

German government authorities and public offices are recommended to use software which carries the Data Protection Seal of Approval. We see this as an obligation for TeamDrive to continue the development of secure and easy to use collaboration and synchronisation software for new platforms like smartphones and tablet PCs which we will release later this year.

Photo: The privacy seal was awarded by Marit Hansen, Vice President of the Independent Centre for Privacy Protection Schleswig-Holstein (Germany) to Volker Oboda, CEO of TeamDrive Systems GmbH, August 5th, 2011

Monday, May 23, 2011

Around the world: search for privacey while using online sync

It is very obvious, Internet users this year are getting more concerned about privacy and security than ever before. The press is full of incidents of data leaks from high secure government servers and stolen identities and credit card information from the Sony network. All in common reliable services until such an incident. What do we learn from this? Security vulnerabilities are everywhere and users cannot trust by definition a secure service. So, when using the Internet to collaborate, back-up and share data on-line it is recommended to be extra suspicious of the services to choose. Often users have to read between the lines. Many online services write that they provide full encryption and forget to mention that they posses the keys for your data. This should worry users as they are kept in a deceitful security. Most online Internet services expose your data to such risk and they even confess in their terms & conditions that they will cooperate with government and official institutions to hand out requested data.
Conceptually, we at TeamDrive designed our software that way, that the privacy of customers can always be granted for all data. We highly encrypt all communication and all data in the clients and the keys remain there. Which means that no one could ever access your data outside of your trusted clients. We are very delighted that more and more users and companies around the world recognize the advantages of the Teamdrive technology. Recently we can see many tweets, reviews, comparisons and download recommendations from all over the world and in many different languages. Here are just a few samples from the past few weeks:








Wednesday, February 23, 2011

AfterWorkArt & Charity Event

The TeamDrive team hosted a charity event to support the "NON-PROFIT FOUNDATION AGAINST THE FATAL CHILDREN’S DISEASE
NEURONAL CEROID LIPOFUSCINOSIS (Batten disease) NCL". It was a nice charity event and great party at our TeamDrive offices. We thank our fantastic guests, sponsors and partners. The German actor Mathieu Carrière was the special Guest and the fantastic blues and soul singer Jessy Martens made it a great party. The pictures where all made with iPhones tweeted on TwitPic by grossstark. It was an inspiration to repeat somthing like this in a year from now.
More pictures from the event are posted on our facebook page.

Thursday, January 6, 2011

TeamDrive wins the sync comparison in Computerbild

Great news for TeamDrive in the first week of the new year. Computerbild, the largest computer magazine in Europe, voted TeamDrive as the best online sync tool. It is an encouraging result in a very competitive environment and a great motivation for the hole team to work hard to expand that position with our new upcoming releases. The competition to TeamDrive in the test where Microsoft LiveMesh, Wuala and Dropbox. As the smallest company in this field we need to spread the word and continue to grow our recognition in the market.

Happy New Year 2011

Friday, December 24, 2010

Happy Holidays and Merry XMAS

Thank you for the great support in 2010, your ideas, your comments and your word-of-mouth are inspiering. We wish you a nice, relaxing time, a peaceful holiday season and a good start for 2011.

Best wishes for 2011
Your TeamDrive Team

Monday, December 13, 2010

University of Leeds switched from Dropbox to TeamDrive

The DART Project is a Science and Heritage project funded by the AHRC and EPSRC. The university decided for TeamDrive due to the ability to use their own servers. They enjoy an ease of use and self administration of project members similar to Dropbox with the extra security and privacy protection.

Friday, December 10, 2010

Plenty of work for our fast growing community

Some of you may have already noticed. We are very busy. The feedback from our users led to a number of user interface improvement and to new software releases. Due to the fast growth we are implementing a new user portal for easier account management and better customer information. More information to the changes will follow in a later blogs. We switched from Joomla to Drupal as our CMS system and launched a completely new Website. With this switch we changed our company logo and CI.

Not all of these changes happened without complications and flaws. We thank you all for your patience and cooperation. Please feel free to contact us when you are missing anything.

It is our plan to get all things straight before Christmas that we can all enjoy a relaxing vacation!

Sunday, December 5, 2010

Welcome to the new TeamDrive Blog!

We have started this blog as a service to our clients to help share ideas regarding our product "TeamDrive" and other topics of interest.
To get started, use one of the options on the right-hand side of this page. You can type in a topic of interest into the “search” field, or click on one of the links under “Latest Blog Entries,” or “Archives.” We are continuously adding new content, so please check back on a regular basis for new articles.
We encourage you to get involved in the discussions in this blog by submitting replies to the posts (click on the “comments” link beneath the article where you wish to comment) or by e-mailing us at You can also subscribe to this blog.
If there are any additional topics you would like to see covered in this blog, please let us know.

Your TeamDrive Team!