Risk
12/5/2012
03:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Wave Systems Introduces Scrambls For Enterprise; Technology Protects Data Posted On Social Networks

Scrambls protects data that is often overlooked in corporate security initiatives

Lee, MA--December 4, 2012 – Scrambls for Enterprise launched today, giving organizations a means for their employees to safely collaborate over social media sites like TwitterÒ and Facebook, and share files with cloud services like DropboxÔ and Salesforce.comÒ. Scrambls protects data that is often overlooked in corporate security initiatives – information shared online via social media, files stored in the cloud and data in motion.

Employees are free to leverage existing social media infrastructures to enter status updates, Tweets, blog posts, files and more, without jeopardizing security or privacy. Scrambls for Enterprise encrypts data before it ever leaves a user's computer or smartphone. Posts and files can only be viewed by those the enterprise grants permission to--everyone else sees scrambled text.

"Social media and cloud services are expanding the way business is done, but enterprises need greater control of the information they share across the public web," commented Steven Sprague, scrambls co-creator and CEO of Wave Systems. "These services are often self-discovered by employees who use them to share critical information. Enterprises need to take responsibility for this new flow of data, and scrambls provides the privacy, security and audit controls similar to what you'd see with corporate email accounts."

The power of scrambls lies in the permissions granted to group members. To read a post or descramble a file, the service automatically applies the permission to make it readable again for only those individuals granted access. Business administrators set the policy and manage the groups. Add or remove people from the groups at any time to change who can read messages and files, even after they've been published on the web.

"Scrambls can open up new business opportunities with use cases for every type of vertical market," continued Sprague. "In healthcare, a private and protected channel for communication leads to better care and service. It's easy for doctors, social workers and caregivers to have sensitive discussions about the care of a family member in real time using popular tools like Twitter or Facebook. Those conversations remain private with scrambls."

Deploying scrambls in the Enterprise

The scrambls enterprise console gives employees, managers and IT staff the ability to manage accounts. You first create groups for access either by email addresses or through the existing corporate lists that enterprises already use (Active Directory, corporate email domains, etc.). Add more detailed rules as needed, like an expiration date for a file, or a password that can be used to view a blog post. Deploy the client install or have users download it, and they're ready to scramble. It's as simple as that!Scrambls privacy and security can be added to an organization's internal applications as well through a software developer kit. The SDK enables third-party apps and sites to integrate directly with scrambls to leverage the same groups for security, privacy and control.

Scrambls for Enterprise is available with special trial and introductory pricing for a limited time. Contact sales@scrambls.com for more information on securing social media and cloud services in your organization. A free consumer download is also available at www.scrambls.com.

About Scrambls

Scrambls is a Cloud security and privacy service developed by Wave Systems Corp. (NASDAQ: WAVX) that makes online sharing simple and safe. All you need is the scrambls plug-in added to your browser toolbar, or a scrambls-enabled application. Scrambls lets you decide what the privacy policy will be for each communication that you share. Scrambls makes Cloud sharing smarter, with security and control over what you are sharing and with whom you are sharing it.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.