Echoworx Security Cloud

Powered by SC Magazine
 

This is an interesting product. It is interesting both for what it does and what it doesn't do. What it does is manage credentialing throughout the enterprise, virtual or physical. It keeps credentials on the endpoints and encrypts there. It supports just about any platform one can think of.

What it doesn't do is require the user to access the cloud every time they want to encrypt an email message. The cloud, then, becomes a platform for credential provisioning. Provisioning, especially in a PKI environment such as this, can be the fly in the ointment that makes an encryption product inconvenient to use. We liked this one because it is simple to use, secure and effective.

One of its most useful applications is email. Encrypted email can be problematic. What if your recipient doesn't use the same flavor of encryption that you do, for example? Echoworx encrypts and sends the email using your regular email platform  using a single button. At this point, if you are on the sender's system, you get the message, click and read. If not, you get a link that will give you the credentials you need to read and reply to messages from this sender. You can initiate messages to the sender as well. 

Echoworx has been around for more than eight years and has been best known for its privacy applications. These apps plug into Security Cloud as well, so users of the company's other apps have the same credential management services available as users of the email application.

While this tool does not secure the cloud itself, it uses it for an important aspect of internet-enabled business functions.

Copyright © SC Magazine, US edition


Echoworx Security Cloud
 
:
Overall Rating
Product Info
Supplier:
 
Tags
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 437

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 210

Vote