On March 16, 2018, The US Department of Homeland Security (DHS) and the FBI warned that “Russian state-sponsored cyber-attackers are targeting critical infrastructure – and have been for quite some time.” It’s important to note that various studies have determined that the attackers “conducted extensive reconnaissance” in advance of the attacks. There is a very high likelihood that nation-state attackers are actively monitoring the communications of nuclear power plants and water and electric utilities in an effort to collect information about how they respond to probing attacks. Understanding how organizations respond to probing attacks enables the attacker to be more targeted and deliberate in subsequent attacks Defense in Depth Encryption Strategy ArmorText has devised a Defense in Depth Encryption Strategy to safeguard sensitive communications and strengthen system-wide emergency response preparedness, and recovery operations. True End-to-End Encryption That’s Specific to Each User+Device, Multi-Factor, Authentication and Unique Ciphers for every message Client Eyes Only Privacy Architecture Insider Threat Risk Reduction Strategy Compartmented Communications Trust relationships that enable or disable communications between distinct groups within an organization or between multiple organizations at home and abroad Virtual War Room for Crisis Management & Incident Response ArmorText was built to meet the regulatory requirements and guidelines of the Sarbanes–Oxley Act of 2002 NERC recommended requirements for Incident Reporting and Response Planning DFARS 252.204.7012 Safeguarding Covered Defense Information and Cyber Incident Reporting Built to safeguard sensitive communications and strengthen system-wide emergency response preparedness, and recovery operations Insider Threat Risk Reduction Strategy Segregation of duties between reviewers and administrators makes it possible for admins to manage ArmorText enterprise accounts without having read access to user content The ability to assign distinct reviewers with cryptographically defined scopes of review enforces need to know access policies Client Eyes Only Privacy Architecture Unlike the vast majority of enterprise collaboration providers, ArmorText cannot read customer content stored on our servers The keys necessary to decrypt communications are unique to each user+device and reside on users’ devices, never travel, and are not stored on our servers Virtual War Room for Crisis Management & Incident Response In the event of a ransomware, or bulk-hack incident on a customer’s network, ArmorText can be used as a secure redundant communications and crisis management tool. Virtual War Rooms and document libraries let organizations: Create and manage incident response teams Remotely on-board crisis managers, consultants, teaming partners and customers Share and access documents Share documents with digital rights management controls Records Retention The ability to retain records for regulatory compliance, comply with legal mandates, enforce internal policies requirements, and reduce volumes of critical information on user devices. On a scale of one to 10, with 10 being strongly defended, our critical infrastructure’s preparedness to withstand a destructive cyber attack is about a three based on my experience, General Keith Alexander | Former Director The US Department of Homeland Security (DHS) and the FBI are warning that Russian state-sponsored cyber-attackers are targeting critical infrastructure – and have been for quite some time. March 1, 2018 Russian hackers targeting US defense contractors…Hackers with cyber-espionage group Fancy Bear used phishing emails to target no less than 87 contractors working on military technology projects such as drones, missiles and fighter jets for the U.S. government, according to the AP February 1, 2018 The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries. December 1, 2017 Why you need ArmorText Seamless interoperability across the majority of operating systems, mobile devices, tablets and desktops Protects your conversations, enclosures and high-value transactions Empowers you with full enterprise and information lifecycle controls The only secure messenger built for regulated industries Schedule a Demo Download Brochure