Encryption And Zero Trust | Teamwire App

Encryption and zero trust concept

Teamwire consistently relies on a zero trust security concept and state-of-the-art encryption to ensure the highest security standards.

Encryption and Zero Trust

Trusted by companies where security comes first

Protect your communication and data from cybercrime

Modern encryption technology

Given the ever-increasing threat of cyber attacks, businesses and public authorities need to strengthen their communications security. Teamwire uses state-of-the-art encryption technology to protect your data from unauthorised access and ensure maximum security.

FEATURES

Encrypted data exchange
Data between the app and server is exchanged using HTTPS (TLS 1.2 with Perfect Forward Secrecy). The app and server negotiate random, temporary keys that prevent a potential attacker from decrypting network traffic retrospectively.
Encrypted metadata
Your metadata, including encrypted messages, is encrypted with AES-256 before being transmitted between the client and server. A unique communication key is exchanged via Diffie-Hellman for each device to prevent man-in-the-middle attacks.
Encrypted messages
Messages and digital media (photos, files, etc.) are encrypted by the sender using AES-256 and only decrypted by the recipient after transmission. For this purpose, an individual key is generated for each chat and exchanged with the chat members in encrypted form on a one-time basis.
Encrypted data storage on servers
All messages, digital content and user data are also stored on our servers in encrypted form using AES-256. The database key is outsourced via the so-called "vault".
Encrypted storage on end devices
To protect and separate company data, user data, messages and digital content on mobile devices are also stored in encrypted form using AES-256.

Zero trust security concept

Teamwire consistently employs a zero trust security concept to ensure the highest security standards and protect your company data from unauthorised access.

FEATURES

Multi-factor authentication of users
Teamwire users are authenticated via their email address and telephone number before they can communicate with colleagues or teams.
Two-factor authentication
Teamwire administrators must first complete a multi-step registration process. Two-factor authentication is required each time they access the administration portal.
Passcodes for users
For added security, the IT administration can set a PIN passcode for each employee to access the Teamwire app.
Block access for users or devices
IT administrators can quickly and easily block access for a user or device, e.g. if an employee leaves the company or their device has been compromised.
Minimal permissions and rights
To ensure the best possible data protection, Teamwire grants as few permissions and rights as necessary – at the app, server and infrastructure levels.
Reduced access
Access via firewalls, APIs, etc. is kept to a minimum. The server only communicates with devices it recognises. Unknown device IDs are automatically rejected.
Strict internal security policies
Teamwire treats data with absolute confidentiality and implements strict internal security policies that restrict access to infrastructure, data centres and systems to the maximum extent possible.
Internal and external audits
Regular audits, including penetration tests, vulnerability analyses and security assessments, ensure the highest security standards. Teamwire works closely with external security firms and IT associations to achieve this.
Permanent user and device authentication
Several unique IDs and factors are continuously checked to authenticate users and end devices. This happens every time the app is accessed or opened, as well as when messages are retrieved and sent.

The security and protection of your data is our top priority and part of Teamwire’s DNA.

The architecture of secure communication

Teamwire offers everything you need for secure, highly available, and compliant communication: state-of-the-art communication features, data-sovereign hosting, and centralized control.

Frequently asked questions (FAQs)

Teamwire uses TLS 1.2 with Perfect Forward Secrecy (PFS). The app and server negotiate temporary, random keys. This means that even if someone intercepts old network packets, they remain unreadable. A subsequent attack will not result in subsequent decryption.

All metadata – including encrypted message containers – is encrypted with AES-256 before transmission. Each device has an individual communication key that is generated using Diffie-Hellman key exchange. This means that even metadata is protected against man-in-the-middle attacks.

Yes. Every message and every digital medium (photos, videos, files) is:

 

  1. encrypted by the sender using AES-256,
  2. transmitted,
  3. and only decrypted by the recipient.

 

An individual key is created for each chat and shared with the members on a one-time basis.

Zero trust means that nothing and no one is trusted by default. Every access is checked anew each time. Teamwire implements this through:

 

  • permanent device and user identification,
  • strictly separated roles and permissions,
  • continuous identity verification,
  • minimised approvals at all levels.

Yes – with just one click. IT can:

 

  • Deactivate user accounts
  • Block device access
  • Immediately exclude compromised devices
  • Centrally revoke permissions

 

Ideal for public authorities, organisations with shift work or in the event of device loss.

Yes. Teamwire continuously conducts:

 

  • Penetration tests
  • Vulnerability analyses
  • Code reviews
  • Security assessments

 

– both internally and by external, independent experts. Teamwire is also ISO 27001 certified.