Echoworx Security Cloud

Powered by SC Magazine
 

This is an interesting product. It is interesting both for what it does and what it doesn't do. What it does is manage credentialing throughout the enterprise, virtual or physical. It keeps credentials on the endpoints and encrypts there. It supports just about any platform one can think of.

What it doesn't do is require the user to access the cloud every time they want to encrypt an email message. The cloud, then, becomes a platform for credential provisioning. Provisioning, especially in a PKI environment such as this, can be the fly in the ointment that makes an encryption product inconvenient to use. We liked this one because it is simple to use, secure and effective.

One of its most useful applications is email. Encrypted email can be problematic. What if your recipient doesn't use the same flavor of encryption that you do, for example? Echoworx encrypts and sends the email using your regular email platform  using a single button. At this point, if you are on the sender's system, you get the message, click and read. If not, you get a link that will give you the credentials you need to read and reply to messages from this sender. You can initiate messages to the sender as well. 

Echoworx has been around for more than eight years and has been best known for its privacy applications. These apps plug into Security Cloud as well, so users of the company's other apps have the same credential management services available as users of the email application.

While this tool does not secure the cloud itself, it uses it for an important aspect of internet-enabled business functions.

Copyright © SC Magazine, US edition


Echoworx Security Cloud
 
:
Overall Rating
Product Info
Supplier:
 
Tags
 
 
 
Top Stories
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  24%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  23%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 270

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  61%
 
No
  39%
TOTAL VOTES: 85

Vote