Welcome!

News Feed Item

Absio Launches Dispatch(TM) Application

The First Truly Confidential Alternative to Email

HIGHLANDS RANCH, CO--(Marketwired - March 17, 2014) - Absio Corporation (Absio), a cybersecurity and data control software development company, announced today that it has released a private digital communications application called Absio Dispatch.

In the current age of identity theft and corporate data mining for profit, it is becoming harder and harder for individuals to retain an expectation of privacy and control. Likewise, organizations constantly deal with both outsider and insider data threats. In a competitive market, it is vital for organizations to be able to maintain confidentiality and control of their business communications.

Absio Dispatch is the first truly confidential alternative to email, providing secure digital delivery of confidential messages and attachments. The application looks and feels like email, but unlike email or email plug-ins, it allows users to send, receive and store communications in a continuously encrypted format. Absio Dispatch automatically encrypts every message and attachment individually, and keeps them encrypted on users' and their recipients' computers, tablets, and phones. Only designated contacts can access and read each message.

Absio Dispatch also gives users the power to control with whom they are communicating. Absio users choose whom to accept into their trusted contact network, and only their approved contacts can send messages to them. This saves valuable time by not filtering through spam messages or unwanted emails. Each user can choose to add or remove contacts at any time.

"How do you know a conversation is private? You know who you are talking to and you know others can't eavesdrop. Absio Dispatch provides private communications solely between you and your trusted contacts. We cannot enable anybody, including ourselves, to read your digital communications," said Dan Kruger, Founder and CEO of Absio Corporation. "We cannot give anyone access to information that we do not have. At Absio, you are our customer. You are not our product."

Unlike other secure email providers, Absio does not have any centralized access to passwords, encryption keys or metadata related to its users' digital communications. Each message and attachment is individually encrypted with a different key on the user's device before it is sent over an internet connection to the Absio servers. Absio does not have access to its customers' encryption keys, and does not have an alternate decryption key. This means that Absio does not have the ability to decrypt messages or attachments -- not even a subject line.

"Many people think emails are private, but the reality is that your email is continually read and analyzed. This is one of the ways you receive targeted ads. Your information is often sold when you think you're communicating privately. Absio Corporation was formed to deliver technologies that ordinary people can use to gain control of their digital world," adds Dan Kruger.

Absio Dispatch is available as a subscription service for $17.95 per year per Absio identity (ID). A single Absio ID can be used on multiple devices. The software is currently available for Windows®. An Android™ application will be available in April 2014.

About Absio Corporation

Absio Corporation is a software platform and applications provider that is pioneering new ways to secure and control digital information. Data makes up your digital world. Your data includes your digital identity, relationships, behavior, communications and content. Absio solutions empower individuals and organizations to retain ownership and control of digital property regardless of where, how, or to whom it is distributed. Your data, your rules™. For additional information, please visit www.absio.com.

The following files are available for download:

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...