Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/18/2014
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Glasswall and Encyptics Partner to Eliminate Security Risks in Files and Email Attachments

Deal creates policy-driven proactive defense-in-depth approach to data security.

September 18, 2014 – Frisco, Texas and London, England: Encryptics and Glasswall Solutions today announced their global partnership - integrating their patented technologies to proactively eliminate the risks associated with targeted file-based cyber-attacks and automate the ability for enterprises to protect and control incoming and outgoing sensitive content at the user’s device.

Encryptics, a global provider of patented data protection services, has joined forces with Glasswall Solutions, a pioneer in content security, to ensure their customers maintain control of their structured and unstructured data’s security as it enters or leaves an organization. Emails remain the primary channel through which advanced persistent threats (APTs) are initiated, with 94 percent* of these attacks using file attachments. With the frequency of attacks on businesses of every size increasing and the cost of incident response rising, organizations need a new, proactive approach to ensure file security without slowing down the business through excessive use of file quarantining.

The partnership between Encryptics and Glasswall facilitates the integration of their unique and complementary technologies to create a policy-driven proactive defense-in-depth approach to data security.  The technologies work seamlessly together utilizing Encryptics’ Policy Based Protection (PBP) for email in concert with Glasswall’s zero day APT file protection to scan file attachments and cleanse them of malicious content before the intended recipients can open them and become compromised.  Furthermore, PBP predetermines which files contain private or sensitive content, and automatically and proactively secures them with Encryptics device-level .SAFE encryption and Data Rights Management (DRM) technology. DRM attributes are systematically applied to control the content in perpetuity and are used in accordance with the enterprises’ internal information security policy.  More specifically, Encryptics’ DRM provides the ability to control the timeframe content is available for viewing and whether the recipient is permitted to print, copy, save or forward the information. 

Mitch Scherr, CEO of Encryptics said, “We believe that no matter where it resides, your data always belongs to you. Glasswall’s ability to perform deep analysis of every file entering or leaving the organization, at a byte level in real time, against all manufacturer compliance standards puts organizations in complete control of file security for the first time – eliminating the risk of criminals using files as an easy route into an organization.”

“We oppose the argument, made by some in our industry, that a breach is inevitable and that organizations should focus on the speed and cost of remediation rather than well-planned, proactive defenses,” said Greg Sim, CEO of Glasswall Solutions. “Encryptics shares our zero tolerance of file tampering by criminals and our passion to make the internet a completely safe and secure place to do business.  Early results from our joint projects already demonstrate how, by working together, we can dramatically reduce information security risk compared to existing signature-based solutions.”

 *Trend Micro – spear-phishing email: most favoured APT attack bait

 About Encryptics®

Encryptics develops and delivers enterprise-wide data protection solutions that integrate seamlessly in most existing environments. Encryptics’ patented data protection and Data Rights Management (DRM) platform provides true end-to-end encryption and data access controls to ensure that data remains secure over the course of its entire lifecycle. Encryptics’ cross-platform solutions—built on the Encryptics Data Protection API™—address common security gaps to help organizations in any industry reduce data loss without compromising workflow efficiency. The Encryptics portfolio includes its flagship product, Encryptics for Email™, as well as the new Policy Based Protection. For more information, please visit www.encryptics.com.

 

Contact:
Greg Wise
512.794.4716
[email protected]


About Glasswall Solutions

A global information security software company with offices in London and San Francisco, Glasswall has evolved a unique approach to file security at a granular level, turning the traditional philosophy of defence against malware on its head, Glasswall’s patented technology engine ’looks for known good’ at a byte level as defined by every file manufacturer. Glasswall then regenerates a new, 100% safe file in real-time almost eliminating the need to quarantine or block the documents a business user needs. Glasswall not only provides complete protection against even the most sophisticated, previously unseen threats but puts security professionals back in control of setting compliance standards to meet each organisations security requirements. Glasswall’s technology is proven with global scalability and does not require constant updating to provide complete protection against advanced threats and zero-day attacks. For more information, please visit www.glasswallsolutions.com

 

Contact:

Caroline Powell
+44 (0) 20 8297 5388
[email protected]

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...