Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:10 PM
Dark Reading
Dark Reading
Products and Releases

Vera for Mail Focuses on Email Security for the Enterprise

PALO ALTO, Calif. (November 1, 2017) – Vera (vera.com), the trusted standard for securing and sharing enterprise data, today announced the availability of Vera for Mail, a new product that makes email security simple and scalable for any organization. Built on Vera’s powerful data-centric security platform, Vera for Mail makes it easy to protect confidential communications, classify messages, and dynamically change access rights to email in real-time. Designed specifically for the enterprise, Vera for Mail lets employees, external contractors, partners, and third parties automatically encrypt email messages and attachments, control access to sensitive communications, and more confidently collaborate internally and outside the company. With this new product, the Vera Platform is now the only data-centric security solution that can protect all of an enterprise’s confidential content.

“The significant rise in data breaches from compromised email is changing how companies think about protecting their critical communications,” said Prakash Linga, CTO and co-founder of Vera. “If we can't control how sensitive messages and attachments are used and by whom, we’re going to lose this battle. But, by leveraging the same encryption, classification, rights management, and tracking that powers our file security products, we can achieve what other solutions can’t: simple, data-centric security for email that just works. By taking a proactive approach to security, everybody wins.”

According to the LinkedIn 2017 Cybersecurity Trends Report, more than a third of security teams lack confidence in the strength of their security programs, and fewer than 1 in 10 trust their existing email encryption tools. That’s a challenging trend, given that employees are still 50% more likely to choose email over cloud services like Box or Dropbox to exchange sensitive files. With the rise of regulations that require sensitive information to be encrypted by default, security teams need better ways to protect email and attachments, no matter where they’re sent.

Securing email messages, attachments, and more

Since the company’s founding in 2014, Vera has successfully protected critical business data for the Fortune 100, including industry leaders GE, Capital One, and MetLife. With Vera for Mail, the company is taking the next big step towards their mission to protect any kind of enterprise data, anywhere it travels. Launched as a private Beta in February 2017, Vera for Mail has generated tremendous customer and partner excitement by making email encryption usable and scalable like never before.

With Vera for Mail, enterprises can now:

  • Control sensitive content that leaves the organization. Vera’s data-centric protections don’t expire when an email message or attachment reaches its destination. With 360-degree visibility into all email access attempts, users can easily manage permissions, track sharing, and revoke access, to ensure confidential information stays protected.
  • Protect critical IP sent through email. Beyond simple email encryption, Vera for Mail offers persistent protection and dynamic policy enforcement for both email and critical content shared through services like Box and Dropbox. Users can even dynamically watermark individual emails, restrict screenshots, and prevent the forwarding of content.
  • Achieve simple, scalable security for collaboration and communication. Vera’s seamless interface removes the friction from working with secure email, enabling organizations to deploy and manage it at scale. Designed for the complex enterprise, Vera can also automate the application of email security, enforce permissions and policies, and track how emails, attachments, and files are shared within and beyond the corporate perimeter.

To see Vera for Mail in action and to learn more about data-centric security, please visit:www.vera.com/product/mail. You can also stop by our booth (#402) during this week’s O’Reilly Security Conference taking place October 30-November 1, 2017 at the Hilton Midtown in New York City.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-24
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions...
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.