Welcome!

News Feed Item

Sookasa Introduces Industry's First Compliant Cloud Document Sharing Through Any Email Application With No Receiver Setup Required

Sookasa Launches Industry's First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives

SAN MATEO, CA -- (Marketwired) -- 06/25/14 -- Sookasa, Inc., an innovator in compliance for popular cloud applications and mobile devices, today introduced new capabilities for its Sookasa Cloud Compliance Service™, including the ability for users to share documents through any email provider using secure private links. For the first time, content that is encrypted on public cloud services can be shared securely using file links with any recipient, with no receiver downloads or setup required. Sookasa also has extended its support for Dropbox encryption, compliance and access control to Android devices.

With today's update, Sookasa enables professionals to natively leverage their favorite cloud file sharing services, such as Dropbox, using Windows, Mac and now Android devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. Sookasa now enables professionals to use their favorite email clients, such as Gmail, Outlook, and Mailbox, to securely share documents by sending private links to encrypted data. The recipient must be authenticated in order to access the content of the link, and will not be able to forward access to others.

Cloud services such as Dropbox, Box and Gmail scatter and duplicate files across multiple devices and shared folders. This creates a significant challenge in regulated industries such as healthcare, education, legal and finance because the loss of a single device that is connected to a cloud account can cause a catastrophic data breach and significant legal liability.

"SonoCiné is a medical imaging manufacturer that must transfer large patient files containing private patient information and ultrasound studies for breast cancer imaging," said Mark Kania, SonoCiné director of business development. "The physicians doing the imaging studies must securely transfer these large files to other physicians who give second opinions on these medical images. We are using Sookasa in conjunction with Dropbox to easily share these large images and maintain HIPAA compliance for our hospital and physician customers. We see an increasing need to use Sookasa as we grow our customer base and increase the number of these confidential file transfers of patient information."

Email attachments are a security and compliance threat because they can be scattered across multiple email clients and public servers, and may be easily forwarded to unauthorized recipients. Several cloud file sharing services have replaced email attachments with links pointing to the secure content. While this mitigates the storage of files across multiple email clients and servers, it does not prevent the forwarding of public links to unauthorized recipients. Recent coverage on the vulnerabilities discovered in link sharing from Box and Dropbox also highlight the need to guarantee that link sharing should be made private and secure.

"When I communicate with clients and with insurance carriers I have to follow HIPAA standards," said David Brabender, President, Atman Insurance Services. "Before Sookasa we had to use the fax, which is considered more secure than email. However, fax machines are cumbersome and time-consuming both to us and to the recipients. Sookasa's Secure Link capability is innovative. It meets HIPAA requirements while providing recipients easy access to documents through email, without requiring the recipient to setup any software. I'm a small operation, so Sookasa's affordable price is attractive. In addition, Sookasa makes it easy to grow and add users to the service."

Sookasa Secure Link Sharing produces a unique private link for each receiver and authenticates the recipient's identity when they try to access the file. Professionals in regulated industries can now securely share sensitive data with any recipient, including a client, patient or an external partner, knowing that even if the email is intercepted or forwarded, only the original recipient will be able to access the private information. For example, healthcare providers can now securely send Protected Health Information (PHI) to their patients and colleagues using their favorite email applications, including Gmail and Yahoo! Mail. Law firms can now send sensitive information to their clients without compromising client-attorney privilege using any email client, without the need to deploy email encryption solutions that require extensive IT support.

Sookasa Secure Links are created in a similar way to Dropbox and Box links. The user selects the file they wish to share, designates the appropriate recipient's email, and pastes the private link to any email client of their choice. After the recipient clicks on the link, they will go through an extra authentication step to verify their identity, after which they will be able to access the file. All files accessed are audited and links can be expired at any time by the sender. The recipient does not have to be a Sookasa or Dropbox user in order to access the data.

In addition to enabling file sharing via email, Sookasa is responding to the continuing trend of BYOD where employees are freely choosing between iOS and Android based devices. Today's launch allows organizations in regulated industries, including healthcare, legal and finance, to stay compliant in the BYOD era, and to enable popular cloud services such as Dropbox and Gmail with sensitive data on any Android smartphone or tablet.

"Following our launch and rapid traction earlier this year, many of our customers wanted to extend the high level of security they experienced with Sookasa on Dropbox to documents sent over email," said Asaf Cidon, Sookasa CEO and co-founder. "We have responded to customer demand and launched our Secure Link Sharing, which enables any organization to securely share sensitive documents over an email client of their choice, without requiring the other side to sign up or install to any additional service. Today's launch solidifies Sookasa as a transparent layer of content security for mobile collaboration, allowing companies to safely adopt the best-of-breed file sharing and email solutions of their choice."

Availability and Pricing
The updated Sookasa Cloud Compliance Service is available today directly from Sookasa at www.sookasa.com. Sookasa's compliance package is offered at $10 per month per person or $100 per year per person, including a free 30-day trial. Volume discounts apply. Sookasa also offers a free personal security plan that provides encryption without centralized administration and compliance.

About Sookasa
Sookasa is the industry's first Compliance as a Service™ that transparently protects files across popular cloud services and mobile devices. Sookasa enables professionals to use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA. The company is led by a team of academics, serial entrepreneurs and seasoned security veterans. Headquartered in San Mateo, Calif., Sookasa is backed by Accel Partners. For more information about Sookasa and its solutions, call (888) 675-4998 or visit http://www.sookasa.com.

Note 1 - http://www.sookasa.com/compliance

Sookasa is a registered trademark of Sookasa in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.