Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/7/2018
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Teams & Enterprises Can Now Sign On With a Single Click on Wickr Pro

Chris Lalonde, Wickr COO -- We are excited to announce that teams and enterprises can now use a Single Sign-On (SSO) on Wickr Pro to get up and running in no time. We are proud to become the first among end-to-end encrypted tools with perfect forward secrecy to make strong data protection and privacy easy to adopt in the workplace, particularly for large organizations.

Across industries, over 75% of employees use unsanctioned apps to communicate with their teams completely outside of their company’s view. For an IT department at a global enterprise, it is a security and compliance nightmare to manage a quarter of a million employees using both approved and uncontrolled tools to share valuable business data. Even after an employee leaves, corporate communications still remain on their devices with companies having no way of wiping proprietary data. With adding SSO to Wickr Pro, our goal is to put the power back in the hands of IT teams in managing technology deployment and data protection at scale.

“Everyone has to assume that content shared via business email and traditional collaboration platforms is not protected. Enabling quick adoption of secure communications tools with SSO is a big step forward in ensuring that enterprises are protecting critical business information.”

Joel Wallenstrom, Wickr CEO

As Wickr signs more and more customers among large enterprises, SSO has become one of the most requested features by Fortune 500 companies and federal partners looking to reduce login-related frictions in adopting new technology. While smaller teams can provision and de-provision their employees manually or using LDAP, bigger and more distributed teams require a different solution to make identity and authentication management efficient at scale.

And we know there is nothing more efficient than a process that only takes one click. That is why Wickr integrated Open ID Connect to seamlessly interface with top SSO providers including Okta, AirWatch (VMWare), and ForgeRock to enable enterprises to quickly launch a completely private, end-to-end encrypted collaboration workspace by simply adding Wickr Pro to their company-provisioned app portfolio.

With SSO, large enterprises in the federal, finance, legal, and tech markets can not only easily scale their deployment of end-to-end encrypted workspaces within their organization, but also connect across corporate walls with other companies and individuals on Wickr Pro or Wickr Me.

“No matter whether you chat internally or place a video conference call with external partners and contractors, all communications are always protected device-to-device. There’s no more need to jump on an insecure line or spin up an incident response conversation in apps that are not build to protect your critical data. You can get your work done in one place with full control and privacy.”

Joel Wallenstrom, Wickr CEO

Now administrators can ensure that the right people and teams have access to the organization’s secure collaboration apps. SSO integration streamlines and automates the provisioning of new users, resetting passwords, changing login and security policies, and deactivating users on Wickr Pro. Most importantly, employees no longer need to remember a separate Wickr login and password, making their use of a secure communications platform seamless, and the entire organization more protected.

***

Building Out Next Generation Security & Compliance Features

Wickr’s goal is to extend privacy to all aspects of business collaboration as digital communications and platforms take over the workplace, and we are constantly updating our solutions. The latest updates include:

  • The industry’s first end-to-end encrypted group calling and video-conferencing with perfect forward secrecy so voice conversations are as secure as messaging and file sharing.
  • End-to-end encrypted screen sharing to protect high-target pricing negotiations, incident response, and due diligence discussions.
  • A compliance service to enable organizations in regulated industries to enforce required data retention and security policies.
  • Screenshot detection on Android and iOS for all Wickr apps.
  • Granular controls for data expiration on end user devices.

Wickr Pro users can message 1:1, create secure rooms for teams and projects, set an expiration time for all communications, send encrypted files up to 5GB, and place secure conference calls, all in one app. You can start your FREE TRIAL on Wickr Pro here.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16649
PUBLISHED: 2019-09-21
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the...
CVE-2019-16650
PUBLISHED: 2019-09-21
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the se...
CVE-2019-15138
PUBLISHED: 2019-09-20
The html-pdf package 2.2.0 for Node.js has an arbitrary file read vulnerability via an HTML file that uses XMLHttpRequest to access a file:/// URL.
CVE-2019-6145
PUBLISHED: 2019-09-20
Forcepoint VPN Client for Windows versions lower than 6.6.1 have an unquoted search path vulnerability. This enables local privilege escalation to SYSTEM user. By default, only local administrators can write executables to the vulnerable directories. Forcepoint thanks Peleg Hadar of SafeBreach Labs ...
CVE-2019-6649
PUBLISHED: 2019-09-20
F5 BIG-IP 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 and Enterprise Manager 3.1.1 may expose sensitive information and allow the system configuration to be modified when using non-default ConfigSync settings.