Ecrypt Technologies, the rapidly emerging data security and encryption technology company focused on the enterprise, government, and military market’s sweet spot (providing smart, simple security solutions backed up by military-strength capabilities), is rolling out their “always on” encryption email system, Ecrypt One, at what seems like the height of panic over how unsecured our data is.
Witness the report just out from Gmail’s security transparency project indicating Apple has apparently implemented transit encryption for iCloud email recently, with 95% of traffic from iCloud now appearing to be encrypted using Transport Layer Security. Or the even more recent move by Switzerland-headquartered Confidesk AG to help users manage public key encryption more safely and easily, with the release of a suite of multi-platform tools designed to try and improve client side encryption functionality. Of course, most of this is like plugging holes in a dike with your finger while rearranging deck chairs on the Titanic when compared with the military-strength, feature-rich, Ecrypt One platform.
Ecrypt One creates an environment that safeguards exchange and storage ubiquitously, while also allowing for comprehensive audit integrity of all emails and attachments. A full back-end suite of regulatory compliance capabilities via Ecrypt One’s Compliance Officer console and the ability to easily do on-demand reporting, paired up with inherent security situational awareness that automatically captures, prevents and logs attempted security breaches (malicious or unintentional), is a godsend for protocol remediation and finding out where the holes are. Such granular overwatch reporting capabilities make full-spectrum micromanagement painless and the Ecrypt One platform further ensures, via robust role-based access controls, multi-factor authentication, and server rule-based policies, that a strict access hierarchy is maintained. Designed to easily integrate with a host of other security solutions and productivity tools, this powerful new secure collaboration offering from ECRY was built from the ground up to play nice with other tech, while maintaining a hard security edge.
One of the reasons Ecrypt One is so elegantly powerful as a platform is the vast experience its developers have in devising comprehensive security solutions. ECRY understands that a chain is only as strong as its weakest link and when it comes to network security, this maxim rings truer than ever. Furthermore, ECRY is omnipresently aware of how crucial working out the kinks associated with compliance (to avoid fines) are while going over the nuances of a company’s security envelope, helping them to mold a more complete and perfect solution and then educating staff on procedure. This in-depth understanding of how to achieve a balance between compliance and tight security makes the company’s consulting services particularly attractive to organizations which feel overburdened by a complex network security reform process which they cannot get a handle on themselves.
Ecrypt Technologies is able to go through a customer’s entire network food chain, analyzing and overhauling both practices, as well as the associated technologies, in order to create a more perfect network where management can rest easy, secure in the knowledge that their critical information won’t end up in the wrong hands (which often represents as much as, or even more than half of the value of the entire organization). The loss of trust and impact to share price that goes hand-in-hand with a serious security breach, like what happened recently to Target, with over 70M customers having their data personal information and credit card numbers stolen, speaks for itself (just look at Target’s recent financials).
A report released earlier this week by New York’s Attorney General, Eric Schneiderman, indicates that 1.8M of those hacked in the Target debacle were among the 19.5M resident of that state. The same report also estimated the total cost last year of investigation and rectification for some 900 or more security breaches (over 7.3M records compromised) cost institutions a staggering $1.37B. A quarter of all stolen data from network security breaches ends up being used in fraud and the impact from identify theft in 2012 alone was around $25B in direct/indirect losses. Thankfully, more and more enterprises, as well as government agencies, are taking note and beefing up their network security.
ECRY is poised to capture much of this burgeoning network security market, with offerings like their Ecrypt One being a bold first showing for a smaller company like this, which nevertheless has heavy-hitters on board like former Congressman, Curt Weldon (Chairman) and the likes of retired U.S. Navy Rear Admiral and former Under Secretary of Homeland Security for Science and Technology at DHS, Jay Cohen (Director).
Learn more about Ecrypt Technologies, Inc. by visiting www.EcryptInc.com
Let us hear your thoughts: Ecrypt Technologies, Inc. Message Board