Welcome!

News Feed Item

Sookasa Introduces Industry's First Compliant Cloud Document Sharing Through Any Email Application With No Receiver Setup Required

Sookasa Launches Industry's First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives

SAN MATEO, CA -- (Marketwired) -- 06/25/14 -- Sookasa, Inc., an innovator in compliance for popular cloud applications and mobile devices, today introduced new capabilities for its Sookasa Cloud Compliance Service™, including the ability for users to share documents through any email provider using secure private links. For the first time, content that is encrypted on public cloud services can be shared securely using file links with any recipient, with no receiver downloads or setup required. Sookasa also has extended its support for Dropbox encryption, compliance and access control to Android devices.

With today's update, Sookasa enables professionals to natively leverage their favorite cloud file sharing services, such as Dropbox, using Windows, Mac and now Android devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. Sookasa now enables professionals to use their favorite email clients, such as Gmail, Outlook, and Mailbox, to securely share documents by sending private links to encrypted data. The recipient must be authenticated in order to access the content of the link, and will not be able to forward access to others.

Cloud services such as Dropbox, Box and Gmail scatter and duplicate files across multiple devices and shared folders. This creates a significant challenge in regulated industries such as healthcare, education, legal and finance because the loss of a single device that is connected to a cloud account can cause a catastrophic data breach and significant legal liability.

"SonoCiné is a medical imaging manufacturer that must transfer large patient files containing private patient information and ultrasound studies for breast cancer imaging," said Mark Kania, SonoCiné director of business development. "The physicians doing the imaging studies must securely transfer these large files to other physicians who give second opinions on these medical images. We are using Sookasa in conjunction with Dropbox to easily share these large images and maintain HIPAA compliance for our hospital and physician customers. We see an increasing need to use Sookasa as we grow our customer base and increase the number of these confidential file transfers of patient information."

Email attachments are a security and compliance threat because they can be scattered across multiple email clients and public servers, and may be easily forwarded to unauthorized recipients. Several cloud file sharing services have replaced email attachments with links pointing to the secure content. While this mitigates the storage of files across multiple email clients and servers, it does not prevent the forwarding of public links to unauthorized recipients. Recent coverage on the vulnerabilities discovered in link sharing from Box and Dropbox also highlight the need to guarantee that link sharing should be made private and secure.

"When I communicate with clients and with insurance carriers I have to follow HIPAA standards," said David Brabender, President, Atman Insurance Services. "Before Sookasa we had to use the fax, which is considered more secure than email. However, fax machines are cumbersome and time-consuming both to us and to the recipients. Sookasa's Secure Link capability is innovative. It meets HIPAA requirements while providing recipients easy access to documents through email, without requiring the recipient to setup any software. I'm a small operation, so Sookasa's affordable price is attractive. In addition, Sookasa makes it easy to grow and add users to the service."

Sookasa Secure Link Sharing produces a unique private link for each receiver and authenticates the recipient's identity when they try to access the file. Professionals in regulated industries can now securely share sensitive data with any recipient, including a client, patient or an external partner, knowing that even if the email is intercepted or forwarded, only the original recipient will be able to access the private information. For example, healthcare providers can now securely send Protected Health Information (PHI) to their patients and colleagues using their favorite email applications, including Gmail and Yahoo! Mail. Law firms can now send sensitive information to their clients without compromising client-attorney privilege using any email client, without the need to deploy email encryption solutions that require extensive IT support.

Sookasa Secure Links are created in a similar way to Dropbox and Box links. The user selects the file they wish to share, designates the appropriate recipient's email, and pastes the private link to any email client of their choice. After the recipient clicks on the link, they will go through an extra authentication step to verify their identity, after which they will be able to access the file. All files accessed are audited and links can be expired at any time by the sender. The recipient does not have to be a Sookasa or Dropbox user in order to access the data.

In addition to enabling file sharing via email, Sookasa is responding to the continuing trend of BYOD where employees are freely choosing between iOS and Android based devices. Today's launch allows organizations in regulated industries, including healthcare, legal and finance, to stay compliant in the BYOD era, and to enable popular cloud services such as Dropbox and Gmail with sensitive data on any Android smartphone or tablet.

"Following our launch and rapid traction earlier this year, many of our customers wanted to extend the high level of security they experienced with Sookasa on Dropbox to documents sent over email," said Asaf Cidon, Sookasa CEO and co-founder. "We have responded to customer demand and launched our Secure Link Sharing, which enables any organization to securely share sensitive documents over an email client of their choice, without requiring the other side to sign up or install to any additional service. Today's launch solidifies Sookasa as a transparent layer of content security for mobile collaboration, allowing companies to safely adopt the best-of-breed file sharing and email solutions of their choice."

Availability and Pricing
The updated Sookasa Cloud Compliance Service is available today directly from Sookasa at www.sookasa.com. Sookasa's compliance package is offered at $10 per month per person or $100 per year per person, including a free 30-day trial. Volume discounts apply. Sookasa also offers a free personal security plan that provides encryption without centralized administration and compliance.

About Sookasa
Sookasa is the industry's first Compliance as a Service™ that transparently protects files across popular cloud services and mobile devices. Sookasa enables professionals to use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. The company is led by a team of academics, serial entrepreneurs and seasoned security veterans. Headquartered in San Mateo, Calif., Sookasa is backed by Accel Partners. For more information about Sookasa and its solutions, call (888) 675-4998 or visit http://www.sookasa.com.

Note 1 - http://www.sookasa.com/compliance

Sookasa is a registered trademark of Sookasa in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...