Hybrid between a centralized and decentralized system.
You get a device to install at your office which co-administers your encryption keys.
Every operation is verified by each the central server and the device at your office.
Hacking only one of them doesn't compromise the security.
Share files and messages with full control of your privacy.