Critical Infrastructure

Defense in Depth Encryption Strategy - Client Eyes Only Privacy Architecture - Enterprise and Information Lifecycle Controls - Best in Class User Experience

On March 16, 2018, The US Department of Homeland Security (DHS) and the FBI warned that “Russian state-sponsored cyber-attackers are targeting critical infrastructure – and have been for quite some time.” It’s important to note that various studies have determined that the attackers “conducted extensive reconnaissance” in advance of the attacks. There is a very high likelihood that nation-state attackers are actively monitoring the communications of nuclear power plants and water and electric utilities in an effort to collect information about how they respond to probing attacks. Understanding how organizations respond to probing attacks enables the attacker to be more targeted and deliberate in subsequent attacks

Built to safeguard sensitive communications and strengthen system-wide emergency response preparedness, and recovery operations

Insider-Threat-Risk
Insider Threat Risk Reduction Strategy
  • Segregation of duties between reviewers and administrators makes it possible for admins to manage ArmorText enterprise accounts without having read access to user content
  • The ability to assign distinct reviewers with cryptographically defined scopes of review enforces need to know access policies
Client-Eyes-Only
Client Eyes Only Privacy Architecture
  • Unlike the vast majority of enterprise collaboration providers, ArmorText cannot read customer content stored on our servers
  • The keys necessary to decrypt communications are unique to each user+device and reside on users’ devices, never travel, and are not stored on our servers
Virtual-War-Room
Virtual War Room for Crisis Management & Incident Response

In the event of a ransomware, or bulk-hack incident on a customer’s network, ArmorText can be used as a secure redundant communications and crisis management tool. Virtual War Rooms and document libraries let organizations:

  • Create and manage incident response teams
  • Remotely on-board crisis managers, consultants, teaming partners and customers
  • Share and access documents
  • Share documents with digital rights management controls
Records Retention
Records Retention

The ability to retain records for regulatory compliance, comply with legal mandates, enforce internal policies requirements, and reduce volumes of critical information on user devices.

On a scale of one to 10, with 10 being strongly defended, our critical infrastructure’s preparedness to withstand a destructive cyber attack is about a three based on my experience,

General Keith Alexander | Former Director

The US Department of Homeland Security (DHS) and the FBI are warning that Russian state-sponsored cyber-attackers are targeting critical infrastructure – and have been for quite some time.

March 1, 2018

Russian hackers targeting US defense contractors…Hackers with cyber-espionage group Fancy Bear used phishing emails to target no less than 87 contractors working on military technology projects such as drones, missiles and fighter jets for the U.S. government, according to the AP

February 1, 2018

The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries.

December 1, 2017
mobile

Why you need ArmorText

  • Seamless interoperability across the majority of operating systems, mobile devices, tablets and desktops
  • Protects your conversations, enclosures and high-value transactions
  • Empowers you with full enterprise and information lifecycle controls
  • The only secure messenger built for regulated industries

Case Studies

Jones Group International (JGI)

A Powerful Enterprise Messaging Solution for Global Concerns

DOWNLOAD
Levick

Secure Messaging and Crisis Management in the midst of an escalating international conflict

DOWNLOAD

Customer Feedback

“The threat of industrial espionage is real. Secure communications is an integral part of how we operate, and ArmorText is a key component of our overall business strategy.”

Luke Ritter

CEO, Fraser Optics

“ArmorText provides secure, immediate messaging no matter where in the world our team is deployed. Their tech support is unmatched, often responding immediately when questions are posed from eight time zones away.”

Greg Jones

Vice President, JGI

"The threat to proprietary information is very real and will only increase over time. ArmorText is simply the best product offering in the category."

Todd Bradley

Colonel (ret), United States Air Force

"The entire foundation of our organization is based on trust — the trust our donors, partners, and beneficiaries put in us. A breach of our communications and any privacy leaks would be devestating to them and to us."

Sarah Hillware

Founder & President, Girls Health Ed

Copyright 2018 ArmorText | All Rights Reserved