SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

3rd Party Remote Call Monitoring Feature

February 17, 2010

Secure Third Party Communication Addressed by Entrust Release

By David Sims, TMCnet Contributing Editor
Whether you’re a contractor, vendor or trusted party, secure communication with various outside partners is critical to any enterprise’s comprehensive security approach. But it’s a complex process. To help simplify it, Entrust (News - Alert) provides capabilities for secure external communication via Entrust Entelligence Security Provider 9.1.

“As hard as organizations work to maintain proper internal security protocol, industry compliance and government mandates often dictate that securing external communication channels is just as important,” said Bill Conner, president and CEO of Entrust, adding quite sensibly that from simple right-click encryption to the self-signed digital IDs, “we saw a need for straightforward methods of secure communication with parties outside an organization’s core network.”

This release represents what Conner considers to be “an important point on Entrust’s technology roadmap” for the popular enterprise security products.

“As the key management system for all digital certificates, this now includes enhanced capabilities and is evolving with customer usage as they migrate to new operating systems,” Conner said.

So with the introduction of 32- and 64-bit compatibility for Microsoft (News - Alert) Windows 7, Entrust Entelligence Security Provider is now designed to operate with many platforms, including Microsoft Windows 2000, Windows XP Server 2003, Windows Server 2008 and Windows Vista.

A value-added feature of the new release, TrueDelete, provides Entrust Entelligence Security Provider 9.1 users with “true overwrite protection,” company officials said, explaining that by knowing that information is properly overwritten and undecipherable if recovered, “users now have the ability to delete files with added confidence. With right-click functionality, TrueDelete uses 12 different overwrite methods as a means of verifying that deleted information cannot be retrieved.”

Twelve processes. We’d think that would do it.

For users that rely on customization, Entrust provides a script for command-line encryption: “Simply use script language to automate encryption and signing activities on files,” company officials said.

David Sims is a contributing editor for TMCnet. To read more of David’s articles, please visit his columnist page. He also blogs for TMCnet here.

Edited by Kelly McGuire
» More 3rd Party Remote Call Monitoring Feature Articles

blog comments powered by Disqus

Technology Marketing Corporation

800 Connecticut Ave, 1st Floor East, Norwalk, CT 06854 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments: tmc@tmcnet.com.
Comments about this site: webmaster@tmcnet.com.

STAY CURRENT YOUR WAY

© 2014 Technology Marketing Corporation. All rights reserved | Privacy Policy