Welcome!

News Feed Item

DataMotion Announces Next-Generation SecureMail Gateway

Policy-Based Encryption and Exact Matching Functionality Reduce False Positives, Protect Sensitive Data and Help Companies Achieve Compliance

MORRISTOWN, N.J., Dec. 10, 2012 /PRNewswire/ -- DataMotion (www.datamotion.com), an established cloud-based secure data delivery provider, today announced the next generation of its SecureMail Gateway™, an intelligent monitoring solution that uses policy-based encryption  and Exact Matching™ functionality to prevent data leakage and protect sensitive information housed in email messages and file attachments. This automated solution takes email security and compliance out of the hands of employees – minimizing human error, ensuring strict policy enforcement company-wide, and making it easier than ever for organizations to protect important information in transit and adhere to privacy regulations. 

(Logo: http://photos.prnewswire.com/prnh/20120413/NE87365LOGO )

"DataMotion's SecureMail Gateway completely transformed our business," said Anthony J. Patti, SVP, CFO and Treasurer, Reading Co-operative Bank. "We now have better communication with our customers and board members, as well as the FDIC and the Federal Reserve. We've experienced increased employee productivity and cost savings, as we no longer have to rely on fax or mail to transmit sensitive data. We're confident that our data delivery is secure, reliable and compliant with industry regulations. And, as an added bonus, DataMotion has tamed the false positive problem, which frees up our IT staff to focus on higher-priority tasks."

Securing sensitive email is required to comply with regulations such as GLBA, HIPAA, HITECH and PCI, and should also be a best practice in risk management for all companies. But, despite legal liabilities and business implications, many companies still do not have secure email measures in place. In fact, a recent DataMotion survey found that 34.5% of respondents do not have the ability to encrypt email, and 28.9% do not monitor the content of outbound email and file attachments for compliance purposes. Regardless of the reason, companies are cutting corners even as data breaches continue to make headlines and regulatory agencies hand out millions of dollars in fines for privacy and security violations.

DataMotion's SecureMail Gateway provides companies with a simple, efficient and cost-effective way to secure email and achieve compliance. The Gateway scans all outbound email and attachments for sensitive content as defined by corporate policies and automatically encrypts all messages that require secure delivery. Adding an extra layer of intelligence to the filtering process, the Gateway uses Exact Matching functionality in addition to traditional pattern matching to better identify and secure email containing sensitive data. Exact Matching compares target email messages against an actual set of dynamically updated data specific to an organization, such as customer account numbers. The specificity of Exact Matching greatly reduces false positives – eliminating the time and effort IT administrators spend investigating them.

"New regulations, stricter data retention policies, and the risks associated with data leakage are all driving the need for secure email and data delivery," said Michael Osterman, president, Osterman Research, Inc. "Encryption is one of the most successful ways to secure sensitive content in email, but many companies still lack this tool today. In order to be adopted widely, encryption services need to be easy to use for both the sender and recipient. Through its SecureMail Gateway, DataMotion has delivered a simple yet effective secure email solution that helps companies protect sensitive data in transit – and it comes at a time when the industry needs it most."

Additional features of DataMotion's SecureMail Gateway include:

  • Real-time updates – Exact Matching filters are automatically refreshed with updates to company data contained in external files, ensuring email and attachments are always scanned against the most current information.
  • Enhanced outbound mail filtering – The Gateway includes three types of outbound mail filtering, including custom exact data matching rules, industry-specific lexicon rules and regular expression rules.
  • Security notifications – Senders may be notified if their messages are routed for secure delivery, helping to educate employees on secure email best practices and reinforce company policies.
  • Extensive file attachment scanning – More than 300 different file attachment types can be scanned for sensitive content.
  • Extensive message tracking – Messages are monitored, tracked and reported on at every phase of the process, giving IT better visibility into data delivery. Senders also have the ability to request a confirmation when their messages arrive safely.
  • SecureContact.me functionality – Companies can provide their customers with the ability to initiate secure inbound messages, demonstrating their commitment to protecting confidential data.

"Companies need to have a multi-pronged approach to data protection, and data in transit cannot be left out of the equation," said Bob Janacek, co-founder and CTO, DataMotion. "Many organizations turn off policy filtering of outbound email because traditional approaches produce too many false positives.  SecureMail Gateway solves this problem, providing IT with an easy-to-use, affordable and secure data delivery solution. It provides business value by reducing the time and resources it takes to keep sensitive data secure and compliant. IT has enough to worry about – securing their sensitive email doesn't have to be one of them."

For more information about DataMotion's SecureMail Gateway, please visit http://www.datamotion.com/Products/SecureMailGateway.aspx.

About DataMotion
DataMotion enables organizations to dramatically reduce the cost and complexity of delivering electronic information to employees, customers and partners in a secure and compliant way. The company's core DataMotion Platform solves a broad range of business issues by providing a secure data delivery hub. The company's easy-to-use solutions for secure email, file transfer, forms processing and customer contact leverage the DataMotion Platform for unified data delivery. Millions of users worldwide rely on DataMotion to transparently improve business processes and reduce costs, while mitigating security and compliance risk. DataMotion is privately held and based in Morristown, N.J.

Media Contacts:

Monica Hutton
DataMotion
(973) 455-1245 x510
[email protected]

Marty Querzoli
Davies Murphy Group
(781) 418-2433
[email protected]

SOURCE DataMotion

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning provides predictive models which a business can apply in countless ways to better understand its customers and operations. Since machine learning was first developed with flat, tabular data in mind, it is still not widely understood: when does it make sense to use graph databases and machine learning in combination? This talk tackles the question from two ends: classifying predictive analytics methods and assessing graph database attributes. It also examines the ongoing lifecycl...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...