Endpoint

6/7/2018
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Teams & Enterprises Can Now Sign On With a Single Click on Wickr Pro

Chris Lalonde, Wickr COO -- We are excited to announce that teams and enterprises can now use a Single Sign-On (SSO) on Wickr Pro to get up and running in no time. We are proud to become the first among end-to-end encrypted tools with perfect forward secrecy to make strong data protection and privacy easy to adopt in the workplace, particularly for large organizations.

Across industries, over 75% of employees use unsanctioned apps to communicate with their teams completely outside of their company’s view. For an IT department at a global enterprise, it is a security and compliance nightmare to manage a quarter of a million employees using both approved and uncontrolled tools to share valuable business data. Even after an employee leaves, corporate communications still remain on their devices with companies having no way of wiping proprietary data. With adding SSO to Wickr Pro, our goal is to put the power back in the hands of IT teams in managing technology deployment and data protection at scale.

“Everyone has to assume that content shared via business email and traditional collaboration platforms is not protected. Enabling quick adoption of secure communications tools with SSO is a big step forward in ensuring that enterprises are protecting critical business information.”

Joel Wallenstrom, Wickr CEO

As Wickr signs more and more customers among large enterprises, SSO has become one of the most requested features by Fortune 500 companies and federal partners looking to reduce login-related frictions in adopting new technology. While smaller teams can provision and de-provision their employees manually or using LDAP, bigger and more distributed teams require a different solution to make identity and authentication management efficient at scale.

And we know there is nothing more efficient than a process that only takes one click. That is why Wickr integrated Open ID Connect to seamlessly interface with top SSO providers including Okta, AirWatch (VMWare), and ForgeRock to enable enterprises to quickly launch a completely private, end-to-end encrypted collaboration workspace by simply adding Wickr Pro to their company-provisioned app portfolio.

With SSO, large enterprises in the federal, finance, legal, and tech markets can not only easily scale their deployment of end-to-end encrypted workspaces within their organization, but also connect across corporate walls with other companies and individuals on Wickr Pro or Wickr Me.

“No matter whether you chat internally or place a video conference call with external partners and contractors, all communications are always protected device-to-device. There’s no more need to jump on an insecure line or spin up an incident response conversation in apps that are not build to protect your critical data. You can get your work done in one place with full control and privacy.”

Joel Wallenstrom, Wickr CEO

Now administrators can ensure that the right people and teams have access to the organization’s secure collaboration apps. SSO integration streamlines and automates the provisioning of new users, resetting passwords, changing login and security policies, and deactivating users on Wickr Pro. Most importantly, employees no longer need to remember a separate Wickr login and password, making their use of a secure communications platform seamless, and the entire organization more protected.

***

Building Out Next Generation Security & Compliance Features

Wickr’s goal is to extend privacy to all aspects of business collaboration as digital communications and platforms take over the workplace, and we are constantly updating our solutions. The latest updates include:

  • The industry’s first end-to-end encrypted group calling and video-conferencing with perfect forward secrecy so voice conversations are as secure as messaging and file sharing.
  • End-to-end encrypted screen sharing to protect high-target pricing negotiations, incident response, and due diligence discussions.
  • A compliance service to enable organizations in regulated industries to enforce required data retention and security policies.
  • Screenshot detection on Android and iOS for all Wickr apps.
  • Granular controls for data expiration on end user devices.

Wickr Pro users can message 1:1, create secure rooms for teams and projects, set an expiration time for all communications, send encrypted files up to 5GB, and place secure conference calls, all in one app. You can start your FREE TRIAL on Wickr Pro here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
Cybercriminals Think Small to Earn Big
Dark Reading Staff 3/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: LOL  Hope this one wins
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.