Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/4/2010
02:04 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber-Ark Rolls Out New Secure Email Manager

Secure Email Manager integrates directly with Microsoft Outlook

NEWTON, Mass. – November 2, 2010 – Cyber-Ark' Software, the leading global software provider for protecting critical applications, identities and information, today announced Secure Email Manager, a new file transfer product available now in version 6 of its Governed File Transfer Suite. The easy-to-use Secure Email Manager fosters adoption of more efficient file transfer processes by empowering employees to safely share and track files, regardless of size, within their native email environments. It helps avoid clogging in Exchange servers by offloading large file transfers and enables security and IT departments to decrease overhead and improve compliance with corporate security policies and industry regulations.

Secure Email Manager integrates directly with Microsoft Outlook and doesn’t require administrative rights, which makes it simple to deploy and negates the need for lengthy training sessions. For ad-hoc and one time secure file transfers, users simply compose an email, click on the “Secure Attach” button, select the file(s) they want to share and hit the “Send” button.

Cyber-Ark’s Secure Email Manager seamlessly strips, encrypts, compresses and transfers attachments via the Inter-Business Vault', enabling emails to be exchanged securely between employees and recipients. The original email attachment is replaced with a link that directs recipients, regardless of email program, to a simple and secure web download portal that can be fully branded. Senders can track activity associated with their data directly from their email client, and all policies and permissions are handled transparently behind the scenes, making them completely seamless to users.

“Cyber-Ark’s innovative governed file transfer capabilities provide organizations with an enterprise-ready solution to securely and compliantly transfer attachments through email to recipients, without delaying business processes,” said Roy Adar, vice president of product management, Cyber-Ark Software. “With new enhancements to our Governed File Transfer Suite, business users now have the autonomy to transfer emails without size limitations through an easy-to-use and automated infrastructure, decreasing their dependency on IT departments. Let’s face it: employees who need to share information with third parties as part of their daily work will find a way to send documents. We make it secure.”

Increase Business Autonomy, Reduce IT Overhead and Improve Compliance

Cyber-Ark’s Secure Email Manager integrates with data loss prevention (DLP) systems and web-based file retrieval for any type of recipient and provides automatic notification upon file download. Users can also reduce business risk related to sensitive data loss or exposure. Additional features that demonstrate why the Secure Email Manager is the best choice for ad-hoc, secure file transfer include:

* Improved Compliance: All transfers comply with common regulations and guidelines such as PCI, SOX, HIPAA and the Gramm-Leach Bliley Act; security departments can also implement full, tamper-proof audit trails for files * Enterprise Ready: Supports full Security Information and Event Management (SIEM) and DLP integration as well as Lightweight Directory Access Protocol (LDAP), high availability and secure authentication requirements * Encryption Key Management: Built-in, automated encryption key management eliminates manual processes * Improved Mail Server Performance: Attachments are offloaded from Exchange servers to create greater availability * Business Autonomy: Employees can manage file transfers internally and with external partners with minimal IT involvement

Security: Secure, tamper-proof vault for storing and transferring files means that the content is separated from the operations eliminating the ability of IT administrators to view files sent by the business users

Secure Email Manager is part of Cyber-Ark’s Governed File Transfer Suite, a one-stop-shop for all file transfer needs. It is the only solution that isolates sensitive data sent over the internet, enabling organizations to securely and efficiently exchange sensitive information with their business partners, customers, suppliers and subcontractors using ad-hoc, manual or automated file transfer through a single platform.

Pricing and Availability

The Cyber-Ark Secure Email Manager, part of the Governed File Transfer Suite 6.0, is now available. Cyber-Ark Secure Email Manager supports Microsoft Outlook 2003, 2007 and 2010. For more information about pricing, please contact [email protected] or call +1 (888) 808-9005 (domestic U.S.) or +1 (617) 965-1544 (international).

About Cyber-Ark

Cyber-Ark' Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern application access while demonstrating returns on security investments. Cyber-Ark works with more than 700 global customers, including more than 35 percent of the Fortune 50. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, visit www.cyber-ark.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27187
PUBLISHED: 2020-10-26
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related command...
CVE-2020-7752
PUBLISHED: 2020-10-26
This affects the package systeminformation before 4.27.11. This package is vulnerable to Command Injection. The attacker can concatenate curl's parameters to overwrite Javascript files and then execute any OS commands.
CVE-2020-7127
PUBLISHED: 2020-10-26
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
CVE-2020-7196
PUBLISHED: 2020-10-26
The HPE BlueData EPIC Software Platform version 4.0 and HPE Ezmeral Container Platform 5.0 use an insecure method of handling sensitive Kerberos passwords that is susceptible to unauthorized interception and/or retrieval. Specifically, they display the kdc_admin_password in the source file of the ur...
CVE-2020-7197
PUBLISHED: 2020-10-26
SSMC3.7.0.0 is vulnerable to remote authentication bypass. HPE StoreServ Management Console (SSMC) 3.7.0.0 is an off node multiarray manager web application and remains isolated from data on the managed arrays. HPE has provided an update to HPE StoreServ Management Console (SSMC) software 3.7.0.0* U...