Beyond Encryption - Controlling the Conversation
Protect Text Communications from Breach
Our unique, multi-layered, security methodology builds the powerful foundation that ensures your communications remain under your control, compliant and secure.
Data is encrypted in transit and at rest, protecting your communications from man in the middle attacks. Vaporstream never stores your information and has no access to user content. A new key is generated for each message.
Beyond encryption, Vaporstream puts the organization in complete control of its content, its storage and its use - at all times. Advanced controls remove the risk of propagation. Data leaks simply cannot occur.
Messages never remain on servers or devices. Alleviating clutter and risk, messages vaporize automatically after a predetermined interval of time, based on your corporate policies.
A single copy of messages can be archived to a client-designated 'repository of record' to meet regulatory, legal and business mandates. Compliance reporting and analytics are made available for audit purposes.
Case Study: Security and Compliance Assurance for Mobile Messaging in Regulated Industries
The following case study explores how NowSecure used advanced tools and expertise for ethical hacking to test Vaporstream.
"Simply No Peer To Vaporstream"
Communicate With Confidence with Vaporstream
Third-party security audit and certification provides additional confidence in the Vaporstream app.
Messages are encrypted during transmittal and at rest, each receiving its own unique key.
You are kept in control of your content and the conversation at all times. Unique to Vaporstream, sender controls ensure that message recipients cannot copy, save, print, forward, edit or share messages -preventing data leaks from occurring.
Unique technology obscures a transmitted image to ensure that it is never compromised, protecting the image against attempted screenshots and prying eyes.
Depending on the device in use, screenshots are either prohibited or detected. If detected, an attempted screenshot prompts an alert to all chat members and the offender is removed from the conversation immediately.
Providing the ultimate sender control, senders are able to shred, or vaporize, messages on demand, whether a text has been read or not.
Known as disappearing text, messages will expire automatically after a predetermined interval of time, based on your policy. Messages never remain on sender or recipients' devices, alleviating the need to wipe devices of chats when lost or stolen.
Optionally, Vaporstream Compliance archives a single copy of all conversations to a secure, client-specified repository of record for safe keeping.
The Admin Console enables administrators to grant or modify Vaporstream access controls, to allow or prohibit use, control security and governance policies, set automation templates/ rules and review audit activities/metrics.
A unique ID for each user is created based on a previously assigned corporate email, or phone number, and verified using a verification code at the time of registration.
Security Incident Response
During emergencies, disasters and/or other out of course events, organizations can maintain access to the independent SaaS-based app for incident notification, response, remediation and recovery - keeping bad actors 'out of the know'.
Audit Controls & Integrity
Provides the ability to record and examine activity in systems using or containing ePHI/ ePII. For compliance purposes, the Vaporstream Platform provides a permanent, secure record of all user activity for auditing and monitoring purposes.
Redundancy & Fail-Over
Vaporstream services are hosted at top-tier facilities, providing state-of-the-art infrastructure to meet the highest industry standards for redundancy and fail-over.
News: Combat the Risks of Shadow IT with Secure Messaging
With the increasingly frequent and damaging security breaches in the news today, the natural tendency for IT professionals is to run back to the data centre and patch, upgrade, test and make sure that all business data and, therefore, the corporate reputation, is safe.
News: Defense in Depth Must Include Secure Messaging
According to a recent Accenture report, federal, state and local government agencies experience over 50 times more cyber incidents than any private-sector industry.
Blog: Encryption: Why is This Just Your First Step to Secure Communications
Encryption. It’s a word we hear frequently in the media. Encrypted applications should have backdoors, insists one popular publication. No, it should not, insists another. Make sure you encrypt your data a newspaper tells you.
Blog: What is Cyber Insurance and Why Do You Need It?
These days it seems like you can’t blink without news of another breach or hack. Most recently there was the Equifax hack, affecting over 143 million people, and the global Wannacry ransomware attack in May 2017, which infected more than 230,000 computers in over 150 countries.
Blog: iPhone X: A Privacy Hazard?
The phone boasts a series of exciting new features including an edge-to-edge OLED screen, a powerful front facing camera and, perhaps receiving the most hype of all, Face ID. How cool does that sound?
Blog: Security Breach & The Connection to Your Mobile Workforce
Today’s workforce has gone beyond mobile. It is fluid. The physical mobility of devices has improved so drastically that the lightest devices from 20 years ago would be the heaviest devices today.
Blog: Balancing Security and Usability in a BYOD World
“How much security do you want with your software?” It’s a legitimate question that gets surprising answers. Often, the initial answer is “as much as I can have,” “the more the better” or “all of it!”
Blog: Communication During a Crisis: What Harvey and Irma Should Have Taught Us
Florida and Texas are no strangers to hurricanes. In fact, experiencing a hurricane at this time of year is expected. However, it was the magnitude of Harvey and Irma that was unprecedented.