Welcome!

News Feed Item

Sookasa Introduces Industry's First Compliant Cloud Document Sharing Through Any Email Application With No Receiver Setup Required

Sookasa Launches Industry's First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives

SAN MATEO, CA -- (Marketwired) -- 06/25/14 -- Sookasa, Inc., an innovator in compliance for popular cloud applications and mobile devices, today introduced new capabilities for its Sookasa Cloud Compliance Service™, including the ability for users to share documents through any email provider using secure private links. For the first time, content that is encrypted on public cloud services can be shared securely using file links with any recipient, with no receiver downloads or setup required. Sookasa also has extended its support for Dropbox encryption, compliance and access control to Android devices.

With today's update, Sookasa enables professionals to natively leverage their favorite cloud file sharing services, such as Dropbox, using Windows, Mac and now Android devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. Sookasa now enables professionals to use their favorite email clients, such as Gmail, Outlook, and Mailbox, to securely share documents by sending private links to encrypted data. The recipient must be authenticated in order to access the content of the link, and will not be able to forward access to others.

Cloud services such as Dropbox, Box and Gmail scatter and duplicate files across multiple devices and shared folders. This creates a significant challenge in regulated industries such as healthcare, education, legal and finance because the loss of a single device that is connected to a cloud account can cause a catastrophic data breach and significant legal liability.

"SonoCiné is a medical imaging manufacturer that must transfer large patient files containing private patient information and ultrasound studies for breast cancer imaging," said Mark Kania, SonoCiné director of business development. "The physicians doing the imaging studies must securely transfer these large files to other physicians who give second opinions on these medical images. We are using Sookasa in conjunction with Dropbox to easily share these large images and maintain HIPAA compliance for our hospital and physician customers. We see an increasing need to use Sookasa as we grow our customer base and increase the number of these confidential file transfers of patient information."

Email attachments are a security and compliance threat because they can be scattered across multiple email clients and public servers, and may be easily forwarded to unauthorized recipients. Several cloud file sharing services have replaced email attachments with links pointing to the secure content. While this mitigates the storage of files across multiple email clients and servers, it does not prevent the forwarding of public links to unauthorized recipients. Recent coverage on the vulnerabilities discovered in link sharing from Box and Dropbox also highlight the need to guarantee that link sharing should be made private and secure.

"When I communicate with clients and with insurance carriers I have to follow HIPAA standards," said David Brabender, President, Atman Insurance Services. "Before Sookasa we had to use the fax, which is considered more secure than email. However, fax machines are cumbersome and time-consuming both to us and to the recipients. Sookasa's Secure Link capability is innovative. It meets HIPAA requirements while providing recipients easy access to documents through email, without requiring the recipient to setup any software. I'm a small operation, so Sookasa's affordable price is attractive. In addition, Sookasa makes it easy to grow and add users to the service."

Sookasa Secure Link Sharing produces a unique private link for each receiver and authenticates the recipient's identity when they try to access the file. Professionals in regulated industries can now securely share sensitive data with any recipient, including a client, patient or an external partner, knowing that even if the email is intercepted or forwarded, only the original recipient will be able to access the private information. For example, healthcare providers can now securely send Protected Health Information (PHI) to their patients and colleagues using their favorite email applications, including Gmail and Yahoo! Mail. Law firms can now send sensitive information to their clients without compromising client-attorney privilege using any email client, without the need to deploy email encryption solutions that require extensive IT support.

Sookasa Secure Links are created in a similar way to Dropbox and Box links. The user selects the file they wish to share, designates the appropriate recipient's email, and pastes the private link to any email client of their choice. After the recipient clicks on the link, they will go through an extra authentication step to verify their identity, after which they will be able to access the file. All files accessed are audited and links can be expired at any time by the sender. The recipient does not have to be a Sookasa or Dropbox user in order to access the data.

In addition to enabling file sharing via email, Sookasa is responding to the continuing trend of BYOD where employees are freely choosing between iOS and Android based devices. Today's launch allows organizations in regulated industries, including healthcare, legal and finance, to stay compliant in the BYOD era, and to enable popular cloud services such as Dropbox and Gmail with sensitive data on any Android smartphone or tablet.

"Following our launch and rapid traction earlier this year, many of our customers wanted to extend the high level of security they experienced with Sookasa on Dropbox to documents sent over email," said Asaf Cidon, Sookasa CEO and co-founder. "We have responded to customer demand and launched our Secure Link Sharing, which enables any organization to securely share sensitive documents over an email client of their choice, without requiring the other side to sign up or install to any additional service. Today's launch solidifies Sookasa as a transparent layer of content security for mobile collaboration, allowing companies to safely adopt the best-of-breed file sharing and email solutions of their choice."

Availability and Pricing
The updated Sookasa Cloud Compliance Service is available today directly from Sookasa at www.sookasa.com. Sookasa's compliance package is offered at $10 per month per person or $100 per year per person, including a free 30-day trial. Volume discounts apply. Sookasa also offers a free personal security plan that provides encryption without centralized administration and compliance.

About Sookasa
Sookasa is the industry's first Compliance as a Service™ that transparently protects files across popular cloud services and mobile devices. Sookasa enables professionals to use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. The company is led by a team of academics, serial entrepreneurs and seasoned security veterans. Headquartered in San Mateo, Calif., Sookasa is backed by Accel Partners. For more information about Sookasa and its solutions, call (888) 675-4998 or visit http://www.sookasa.com.

Note 1 - http://www.sookasa.com/compliance

Sookasa is a registered trademark of Sookasa in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...