With the Heartbleed
Bug, SSL/TLS vulnerabilities now being fully exposed in the media and the
fundamental flaws of the widely-used OpenSSL crypto library becoming apparent,
people are racing to change all their email logins and site passwords, despite
the fact that those passwords must eventually be changed again anyways in
several cases as Fixed OpenSSL has not yet been deployed by all service
providers.
Even without the
existence of such massive flaws in underlying backbone technologies, you still
have data breaches like the recent breach at Target, which compromised the
credit card info of tens of millions of shoppers, giving Target a serious black
eye with consumers, shattering their Q4 2013 profits (off by 46%), and
potentially costing them as much as $1B or more according to one industry
analyst. Target is burning cash trying to patch the problem with a $100M
chip-based card technology that would roll out across all their stores by 2015,
but with more fundamental concerns like Heartbleed cropping up, it raises
questions about the overall security landscape, especially since a majority of
the basic account interactions occur online through email or a company’s
website.
At any rate, it
seems that the time for a truly robust, platform-agnostic solution to emerge
has come and ECRY is ready to answer the call with their Ecrypt One secure
email system, which not only provides users with an “always on” encryption
shield against data leaks, device theft, and email-borne threats, but also
comprehensively addresses the most gaping security hole left in the space
today, the human user. Moreover, the Ecrypt One platform provides a secure
collaboration environment for talking to external parties without any
additional software requirements. An environment where a sophisticated array of
security layering techniques exist, including heavily granulated role-based
access controls that limit administrator resource usage to a project-specific
envelope and server rule-enforced security policies. Multi-factor
authentication for all user types further regiments access control and covers
the external parties, including the customers, partners, and even the vendors,
making Ecrypt One a full-spectrum dominance solution for warding off data
security attacks/breaches.
As of April 11, DHS
officials are warning banks, infrastructure operators, and other organizations
to be on the lookout for hackers attempting to exploit the Heartbleed
vulnerabilities, as well as to report any Heartbleed-related attacks. According
to director of the DHS National Cybersecurity and Communications Integration
Center, Larry Zelvin, DHS is working in cooperation with federal, state and
local governments to uncover and mitigate potential impacts, warning that while
no serious incidents have yet cropped up, malicious actors in cyberspace could
leverage these vulnerabilities to exploit unpatched systems.
Considering the
eventual development of precisely these kinds of situations (Target breach,
Heartbleed, etc.) was a big part of what led Brad Lever to establish ECRY back
in 2007, secure in the knowledge that ease of use was a major factor when it
comes to implementing a truly robust security package that can help eliminate
more of the human causes of a security breach. The company has wasted no time
either in assembling an impressive board of well-connected directors to enhance
the long-term growth possibilities for their technology, including Navy Rear
Admiral and former DHS Under Secretary for Science & Technology, Jay M.
Cohen, who is also a principal in the Chertoff Group, former DHS Secretary
Michael Chertoff’s outfit and one of the top high-level strategic thinking
shops in the game today. Also on the ECRY Board is 20-year Republican
Representative in Congress and former Vice Chairman of both the Armed Services
and Homeland Security Committees, Curt Weldon. Another highly influential guy
who, having worked in Congress, understands only all too well how vital easy to
use data security solutions are, especially when it comes to eliminating human-driven
data breaches.
The company also
provides broader security outreach in the form of direct security consulting
services, as well as security talks and insight sharing, helping clients not
only realize levels of relative invulnerability when it comes to organizing
their information systems’ security, but also overcoming the often daunting
associated compliance challenges. It makes good sense to keep up the pace
building a talented team of connected professionals as the true market for
paradigm-shifting products like Ecrypt One become more apparent and so ECRY
grabbed software development and product management veteran, Ian Treleaven at
the start of 2014. Treleaven brings an impressive track record with him to
ECRY, including his tenure as Technical Lead at Microsoft and he clearly has a
striking passion for all things related to information security and crypto.
That passion will serve ECRY shareholders well as he takes the company’s first
Advisory Board member position.
Rather than
rehashing old technologies and solutions, ECRY is evolving new solutions based
around military-strength email and encryption systems.
Get a closer look at
ECRY by visiting www.ecryptinc.com
About QualityStocks
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
QualityStocks is committed to connecting subscribers with companies that have huge potential to succeed in the short and long-term future. We offer several ways for investors to find, evaluate, and learn more about investing in these companies.
Sign up for “The QualityStocks Daily Newsletter” at www.QualityStocks.net
The Quality Stocks Daily Blog http://blog.qualitystocks.net
The Quality Stocks Daily Videos http://videocharts.qualitystocks.net
The Quality Stocks “Ones to Watch” http://gotstocks.qualitystocks.net
Please see disclaimer on the QualityStocks website: http://disclaimer.qualitystocks.net
No comments:
Post a Comment