Welcome!

Wearables Authors: Elizabeth White, Liz McMillan, Carmen Gonzalez, Pat Romanski, Yeshim Deniz

News Feed Item

New Credeon Professional Supports Multiple Encryption Keys to Provide Better File Sharing Security on Popular Cloud Services

SAN BRUNO, CA -- (Marketwired) -- 06/10/14 -- One of the most secure, easy-to-use and affordable solutions for safely sharing confidential documents in the cloud, the new Professional version of Credeon announced today by Hitachi Solutions America includes support for multiple encryption keys. This allows users to assign a unique key to documents associated with a specific business function or group, providing an extra barrier against unauthorized users accidentally accessing files not intended for them.

As with the free version of Credeon, users of the Professional version simply drag-and-drop files to share encrypted documents using any of the major cloud storage services, including Box, Dropbox, Google Drive and Microsoft OneDrive. It is one of the few products that allows users to easily store and share encrypted documents across multiple cloud services while maintaining complete control over who can access the files.

"A little prevention goes a long way and with Credeon Professional secure file sharing doesn't have to be complicated or break the bank. The added benefit of assigning a unique encryption key to a specific set of documents provides another layer of defense against service provider issues like link vulnerability or users accidentally inviting the wrong person to access a document," said Yuji Nakagawa, Vice President of Product Management, Security, Hitachi Solutions America.

Credeon Professional Simplifies Encryption Key Assignments with a Familiar Project Approach

The project-based interface in the new Professional version is designed to quickly manage user access and assign encryption keys to confidential files shared among work groups and larger teams. For example, a department manager might share confidential program-related files with designated team members in one Credeon Project then use a second Project that automatically generates a different encryption key to share sensitive personnel files with the human resources department. Even if the manager accidentally allows team members from the first Project to access the personnel documents in the second Project through the cloud storage service sharing features, they will not be able to open the encrypted files in the second Project.

To create a new Project and generate a new encryption key for a specific set of files or a work group, the Project Leader simply clicks the "Add Project" button in the Credeon Management Console, names the Project and lists the approved users who can access the files. The Project Leader then drops the selected files into the newly created Credeon Project folder before dragging them to the sync folder in any of the popular cloud storage services for sharing.

Authorized users can be added or removed at any time and the Project Leader has complete control over all security settings. This protects the documents from link vulnerability issues that are known to expose supposedly confidential documents to unauthorized users.

"Links to private documents stored on cloud services have been found in search results and have shown up in random pay-per-click advertising reports. Unfortunately in many cases, anyone finding these direct URLs has been able to view the confidential files. But with Credeon, only approved users listed in the Project can access the encrypted files as they sit in the cloud and any unauthenticated users that somehow mistakenly obtain the document URL remain locked out," said Nakagawa.

Credeon provides one of the highest levels of data protection and access control available in cloud-sharing encryption products by implementing three layers of security. With its unique encryption key management system, the user has total control over the encrypted files, protecting documents from unauthorized scrutiny by cloud storage service providers or other entities. Files are protected with industry-standard AES-256 bit encryption algorithms and a FIPS 140-2 certified cryptograph module.

Credeon supports Windows and Mac OS X. Encrypted files can be viewed on Apple iOS and Android mobile devices.

Affordable Business Pricing

A Professional account at $10 per month includes two Projects with two distinct encryption keys controlled by two Project Leaders and encrypted file sharing for up to 10 additional project members. As needed, additional Projects with a unique encryption key and document access for another 10 project members can be added for $10 per month each.

Credeon Basic, designed for individual use and launched in May 2013, continues to be a free service. It includes one Project encryption key, supports one Project Leader and allows encrypted file sharing for up to three project members.

Both the Basic and the Professional versions are available at www.credeon.com.

About Hitachi Solutions America, Ltd.

Hitachi Solutions America Ltd., established in 1991, is a wholly owned subsidiary of Hitachi Solutions, Ltd., and maintains headquarters in San Francisco, with offices in New York, San Diego and Irvine. Together with its parent company, Hitachi Solutions America is part of a global team of over 15,000 employees and provides value-driven services throughout the IT lifecycle, from systems planning to integration, operation and maintenance. For more information, please visit the company's website at us.hitachi-solutions.com.

Contacts:
US:
Harry Ochiai
Hitachi Solutions America, Ltd.
(855) 297-9321
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.