Echoworx Security Cloud

Powered by SC Magazine
 

This is an interesting product. It is interesting both for what it does and what it doesn't do. What it does is manage credentialing throughout the enterprise, virtual or physical. It keeps credentials on the endpoints and encrypts there. It supports just about any platform one can think of.

What it doesn't do is require the user to access the cloud every time they want to encrypt an email message. The cloud, then, becomes a platform for credential provisioning. Provisioning, especially in a PKI environment such as this, can be the fly in the ointment that makes an encryption product inconvenient to use. We liked this one because it is simple to use, secure and effective.

One of its most useful applications is email. Encrypted email can be problematic. What if your recipient doesn't use the same flavor of encryption that you do, for example? Echoworx encrypts and sends the email using your regular email platform  using a single button. At this point, if you are on the sender's system, you get the message, click and read. If not, you get a link that will give you the credentials you need to read and reply to messages from this sender. You can initiate messages to the sender as well. 

Echoworx has been around for more than eight years and has been best known for its privacy applications. These apps plug into Security Cloud as well, so users of the company's other apps have the same credential management services available as users of the email application.

While this tool does not secure the cloud itself, it uses it for an important aspect of internet-enabled business functions.

Copyright © SC Magazine, US edition


Echoworx Security Cloud
 
:
Overall Rating
Product Info
Supplier:
 
Tags
 
 
 
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1045

Vote