Proton Workspace boasts privacy-first alternative to Google, Microsoft

2 hours ago 8
Proton Workspace
Proton

Follow ZDNET: Add america arsenic a preferred source on Google.


ZDNET's cardinal takeaways

  • Proton Workspace is billed arsenic a 'private alternative' to Google and Microsoft productivity suites.
  • Proton Meet, an encrypted video conferencing platform, besides debuts.
  • Is Proton's encrypted attack to productivity capable to support your business?

Proton, the enactment down the fashionable Proton VPN service, is carving a foothold successful the productivity arena with the motorboat of Proton Workspace, disposable today.

Proton, based successful Switzerland and taxable to the country's strict privateness and information extortion laws, calls its caller offering a "private alternate to Google Workspace and Microsoft 365."

Also: 1 successful 2 information leaders accidental they're not acceptable for AI attacks - 4 actions to instrumentality now

In the past fewer years, possibly successful effect to an oversaturated market, galore VPN providers -- including Nord, Surfshark, and ExpressVPN -- began diversifying and rebranding themselves arsenic organizations offering information solutions to businesses and consumers, with VPNs included successful the package. 

Everything Proton Workspace includes

Proton, champion known for its unafraid email and VPN services, has joined this inclination by branching retired into unafraid record storage, credential management, and authentication. Now the institution is bringing everything nether a single, consolidated umbrella. 

Proton Workspace is the result. It's branded arsenic a backstage alternate for businesses that don't privation their audio, video, and chat information logged oregon utilized to bid AI. "Companies are progressively disquieted that their confidential concern information is becoming concern quality for Big Tech and turning to safer alternatives," according to Proton CEO Andy Yen.    

Also: What is antivirus bundle and bash you inactive request it successful 2026?

"We're proceeding much from customers, peculiarly those wary of Big Tech's information practices, that they privation a secure, bundled alternate that matches the easiness of migration and integration of Google oregon Microsoft, but without the privateness trade-offs," Yen added. 

Available March 31, Proton Workspace includes immoderate oregon each of the pursuing Proton products, depending connected the program you choose.

Meet for video conferencing

Workspace besides includes different recently announced app, Proton Meet, an alternate to video conferencing tools similar Zoom and Microsoft Teams. According to the company, Proton Meet is end-to-end encrypted, secured with Messaging Layer Security (MLS), and integrates with Proton, Google, and Microsoft calendars. 

Like rival services, you tin make a gathering nexus for participants, and you don't request a Proton relationship to articulation a video call. This work is disposable online, connected desktop Windows, Mac, and Linux, and via Android and iOS apps. Meetings tin beryllium acceptable up for escaped with up to 50 participants, arsenic agelong arsenic they don't transcend 60 minutes. 

Security considerations for the modern business

There is interest that companies, including Microsoft, Google, Meta, and others, are harnessing idiosyncratic information to bid AI models. Without end-to-end encryption, immoderate concern bundle suites and platforms, including video conferencing tools, could beryllium taxable to surveillance oregon pb to accidental leaks of confidential data.

Also: The champion password managers: Expert tested

We are good beyond the days of Zoom-bombing, but tin encrypted services truly payment businesses today?

Who could benefit?

Whether you are a user oregon a concern owner, encryption is simply a invaluable instrumentality for protecting information. When it is utilized successful messaging apps, email, and video conferencing, encryption protects your connection by making it much hard for information to beryllium stolen successful transit oregon for your online activities to beryllium monitored. 

End-to-end encrypted apps and bundle are fashionable among individuals progressive successful civilian rights and governmental action, arsenic good arsenic journalists and others who whitethorn beryllium astatine greater hazard of surveillance owed to their jobs oregon activities. While I urge adopting encrypted connection tools and a secure browser by default to amended your online privacy, I tin spot a privacy-focused productivity suite appealing to organizations successful these industries. 

What encryption won't support against

Encryption is highly useful, but it isn't a one-and-done information solution for businesses -- it's a invaluable summation to a multi-layered information approach. 

Encryption volition not support your enactment from accidental information leaks, malicious insiders, idiosyncratic error, societal engineering attacks, oregon phishing, whether it is run-of-the-mill spam oregon blase concern email compromise scams. 

Proton is 1 of galore companies processing their ain information ecosystems to vie with tech giants, including Microsoft and Google. However, these companies recognize that to springiness your concern the champion accidental of mitigating cybersecurity risks, you request much than 1 furniture of defense. 

Also: Phishing grooming doesn't halt your employees from clicking scam links - here's why

For example, employees should beryllium trained to spot and debar cybersecurity threats; endpoint devices indispensable beryllium locked down and secured; credentials should beryllium rotated and managed by unafraid credential managers; and firm networks should run nether zero-trust principles -- and each of this needs to beryllium mapped retired successful a information policy. 

Simply signing up for a information work and hoping for the champion isn't enough; information needs to beryllium considered from the outset. Unfortunately, it's present a substance of when, not if, a breach occurs, but adopting modern information principles and tools tin marque each the difference. 

Should you marque the switch?

Making the power to caller concern products often involves pain, including the migration process, worker training, and onboarding. While tech giants can, sometimes, instrumentality practices that aren't wholeheartedly supported by their lawsuit bases -- specified arsenic utilizing idiosyncratic information for AI grooming -- convenience and familiarity are often the reasons we don't power to safer, much unafraid alternatives. 

Also: You're being tracked online - 9 casual ways to halt the surveillance

However, for organizations progressive successful high-risk activities oregon those that request greater privateness than most, specified arsenic activists, ineligible firms, and researchers, the determination to encrypted services makes sense. Keep successful mind, however, that if your concern relies connected third-party integer solutions, you should cheque for compatibility earlier taking the plunge with immoderate caller provider.

ZDNET has reached retired to Proton with further queries, and we volition update if we perceive back. 

Read Entire Article