Business Wire India
Bertin IT, a CNIM Group company, and Wallix have combined their know-how to launch Crypto CrossinG®, a solution combining advanced security mechanisms (protocol breach, harmlessness, filtering) of CrossinG®, the trusted gateway designed by Bertin IT, and DataPeps®, Wallix's 'as-a-service' encryption technology.
This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20180614005841/en/
Crypto CrossinG® thus guarantees the integrity and confidentiality of sensitive data transiting via e-mail between a protected network and an unsecured external infrastructure. Roaming, teleworking, travelling abroad … whatever the place or the direction of the exchanges, this new solution makes it possible to fight against cyber-attacks, to encrypt emails end-to-end and to apply a specific security policy depending on the direction of the data flow (control of authorized files for dispatch and/or reception).
In addition, automated encryption key management offers a simple and transparent user experience (no action required), with the DataPeps® mail plug-in. Crypto CrossinG® can also trace all exchanges.
About Bertin IT
Publishing and integration of software solutions dedicated to information systems security and the advanced processing of digital and voice data. Based on 15 years of collaboration with the French Defense Procurement Agency (DGA) on issues of compartmentalization of classified information, as well as with various Defense & Security government agencies, Bertin IT offers a unique range of cybersecurity products, covering both defense in depth of sensitive information systems and the anticipation of threats, detection of data leaks or fraudulent activities. Its cyber intelligence platforms are used by several intelligence entities. Through its cyber threat intelligence offering, Bertin IT puts its expert analysts and investigative technologies at the service of leading private and public account customers to probe their level of exposure to cyber risk and identify any type of threat that may affect them.
View source version on businesswire.com: https://www.businesswire.com/news/home/20180614005841/en/
MULTIMEDIA AVAILABLE :