Beyond Encryption - Controlling the Conversation
Protect Text Communications from Breach
Our unique, multi-layered, security methodology builds the powerful foundation that ensures your communications remain under your control, compliant and secure.
Data is encrypted in transit and at rest, protecting your communications from man in the middle attacks. Vaporstream never stores your information and has no access to user content. A new key is generated for each message.
Beyond encryption, Vaporstream puts the organization in complete control of its content, its storage and its use - at all times. Advanced controls remove the risk of propagation. Data leaks simply cannot occur.
Messages never remain on servers or devices. Alleviating clutter and risk, messages vaporize automatically after a predetermined interval of time, based on your corporate policies.
A single copy of messages can be archived to a client-designated 'repository of record' to meet regulatory, legal and business mandates. Compliance reporting and analytics are made available for audit purposes.
Case Study: Security and Compliance Assurance for Mobile Messaging in Regulated Industries
The following case study explores how NowSecure used advanced tools and expertise for ethical hacking to test Vaporstream.
"Simply No Peer To Vaporstream"
Communicate With Confidence with Vaporstream
Third-party security audit and certification provides additional confidence in the Vaporstream app.
Messages are encrypted during transmittal and at rest, each receiving its own unique key.
You are kept in control of your content and the conversation at all times. Unique to Vaporstream, sender controls ensure that message recipients cannot copy, save, print, forward, edit or share messages -preventing data leaks from occurring.
Unique technology obscures a transmitted image to ensure that it is never compromised, protecting the image against attempted screenshots and prying eyes.
Depending on the device in use, screenshots are either prohibited or detected. If detected, an attempted screenshot prompts an alert to all chat members and the offender is removed from the conversation immediately.
Providing the ultimate sender control, senders are able to shred, or vaporize, messages on demand, whether a text has been read or not.
Known as disappearing text, messages will expire automatically after a predetermined interval of time, based on your policy. Messages never remain on sender or recipients' devices, alleviating the need to wipe devices of chats when lost or stolen.
Optionally, Vaporstream Compliance archives a single copy of all conversations to a secure, client-specified repository of record for safe keeping.
The Admin Console enables administrators to grant or modify Vaporstream access controls, to allow or prohibit use, control security and governance policies, set automation templates/ rules and review audit activities/metrics.
A unique ID for each user is created based on a previously assigned corporate email, or phone number, and verified using a verification code at the time of registration.
Security Incident Response
During emergencies, disasters and/or other out of course events, organizations can maintain access to the independent SaaS-based app for incident notification, response, remediation and recovery - keeping bad actors 'out of the know'.
Audit Controls & Integrity
Provides the ability to record and examine activity in systems using or containing ePHI/ ePII. For compliance purposes, the Vaporstream Platform provides a permanent, secure record of all user activity for auditing and monitoring purposes.
Redundancy & Fail-Over
Vaporstream services are hosted at top-tier facilities, providing state-of-the-art infrastructure to meet the highest industry standards for redundancy and fail-over.
A Secure Messaging Platform For Any Industry
News: Combat the Risks of Shadow IT with Secure Messaging
With the increasingly frequent and damaging security breaches in the news today, the natural tendency for IT professionals is to run back to the data centre and patch, upgrade, test and make sure that all business data and, therefore, the corporate reputation, is safe.
News: Despite Recent Critical Press, Secure Messaging Platforms Essential to an Enterprises’ Defense-in-Depth Strategy
The media seems to have it out for secure messaging thanks to Uber vs. Waymo and other examples of misuse, but enterprise-grade secure messaging’s compliance, privacy, security and incident response benefits cannot be ignored.
Blog: Encryption: Why is This Just Your First Step to Secure Communications
Encryption. It’s a word we hear frequently in the media. Encrypted applications should have backdoors, insists one popular publication. No, it should not, insists another. Make sure you encrypt your data a newspaper tells you.
Press Release: Vaporstream Wins Cyber Defense Magazine
For the second consecutive year, the leading provider of secure, ephemeral and compliant messaging earns top honors during RSA Conference 2018.
Blog: Ransomware and the City: Not so Sexy
On March 22nd the Atlanta Municipal government was targeted by a ransomware cyberattack. As governments become more reliant on technology, cyber security must be priority number one in ensuring that your services remain operational and the public you serve, and their data, remains safe.
Blog: When Technology Allows a Data Leak: What the Strava Case Means for Privacy
What started out as a novelty quickly spun into something ominous. In November of 2017, the San Francisco-based start-up fitness app Strava released a heatmap depicting the activities of Strava users across the world. What does the Starva leak mean for privacy and what can end-users do to secure their information?devices from 20 years ago would be the heaviest devices today.
Blog: Balancing Security and Usability in a BYOD World
“How much security do you want with your software?” It’s a legitimate question that gets surprising answers. Often, the initial answer is “as much as I can have,” “the more the better” or “all of it!”
Podcast: Private Chatting...Oxymoron or Not
Dr. Galina Datskovsky CEO of Vaporstream discusses the importance of protecting personal information from man-in-the-middle attack with security expert Paul Viollis.