Espion International announced a partnership with Remington Associates
COSTA MESA, Calif. -- Espion International, Inc. (PINKSHEETS: EPLJ), a leader in the fight against email based viruses, spam, and outbound threats of corporate espionage announced a partnership with Remington Associates, LTD., a Schaumburg, IL based Value Added Reseller ("VAR") and Microsoft Security Gold Partner. Espion has developed artificial intelligence ("AI") software that learns to recognize a company's sensitive data in its email communication. Once recognized, this data can either be blocked, or the message can be sent securely using advanced encryption technology.
Remington Associates ("Remington") has provided consulting and project management in the information security sector for nearly ten years. Remington will be introducing Espion's Interceptor with Email Encryption to their many customers that are in need of an encryption solution to monitor and protect the transmission of sensitive corporate data, as well as meet government regulatory requirements under HIPAA, GLBA, and Sarbanes-Oxley.
"With growing regulation concerns and the importance of securing personally identifiable information as well as intellectual property, encrypting corporate communications, especially email, has become a necessity. We are thrilled to have Espion as a partner fulfilling the email encryption market," stated Terry Kurzynski, Managing Partner of Remington Associates, Ltd.
"Remington is a leader in Security and IT Governance issues, and has built an impeccable reputation in their field. We are very excited to be working with them, and honored that they have chosen the Espion Interceptor as an encryption solution for their clients," commented Stephen Dow, CEO of Espion International, Inc. Mr. Dow continued, "According to the U.S. Chamber of Commerce, corporate espionage costs U.S. shareholders at least $25 billion a year in intellectual property losses, and the Interceptor's artificial intelligence ensures that secret corporate or personal information does not leave a company's network."
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024