19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Encryptics –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Email <strong>Security</strong> and Integrity Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics for Email<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics’ flagship product, Encryptics for Email,<br />

showcases this data protection company’s commitment<br />

to true end-to-end data protection. This product<br />

utilizes a hybrid security model unlike any other on the<br />

market today. By eliminating the flaws inherent in existing<br />

models, Encryptics <strong>of</strong>fers the most innovative and<br />

effective solution for the email security space. Most data<br />

protection solutions utilize one <strong>of</strong> two standard security<br />

models: trusted server or peer-to-peer. In a trusted<br />

server model, encryption and authentication take place<br />

at a centralized location (a server, gateway, or router).<br />

This model makes it easy to manage authentication<br />

and control who has access to data once it’s encrypted.<br />

Unfortunately, data is not encrypted until it leaves the<br />

device it was created on and travels to an external appliance<br />

where the encryption will occur. Furthermore,<br />

if the encrypted data and the keys to unlock that data<br />

are stored in the same location, this single point within<br />

the transmission constitutes a serious security risk. The<br />

peer-to-peer model attempts to counter these drawbacks<br />

by decentralizing the process. Because encryption<br />

occurs at the user device level, this model addresses the<br />

security gap between the user’s device and an external<br />

appliance. However, in this model, authentication and<br />

key exchange are also handled at the user device level<br />

and are difficult to manage. Unfortunately, this model<br />

does not eliminate the potential for a single point <strong>of</strong><br />

failure: if the encryption keys travel alongside the encrypted<br />

data at any time, there is always risk <strong>of</strong> interception<br />

and exposure. Rather than choosing between these<br />

existing security models, Encryptics resolved to blend<br />

the best <strong>of</strong> both models in a patented, Trusted Peer-to-<br />

28

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!