Over the next several weeks, we want to introduce you to some of the key customers of our new product, Jack is a senior backend engineer with a large enterprise software firm. He has a lot of experience working with secure systems and takes the time to guarantee data privacy is considered throughout the various steps of his long release …
Innovault makes encryption easy for developers. Read this example of how Brian, a mobile developer, using InnoVault for data security.
Innovault makes encryption easy for developers. Read this example of how Sue, a web developer, using InnoVault for data security.
We are proud to announce the release of our latest product, InnoVault – a toolkit that enables developers building websites, apps, and other software to easily embed end-to-end encryption for data security and privacy. 2016 saw a 40% increase in data breaches over 2015, and the team here at Tozny decided we wanted to do something about it. InnoVault is our …
Tozny’s CEO, Isaac Potoczny-Jones, will be presenting at the High Confidence Software and Systems Conference (HCSS) on May 9, 2017. Come learn about NIST’s Risk Management Framework and how you can apply it to your work. And if you happen to be out in Annapolis, meet up with Isaac at the conference! @SyntaxPolice Applying NIST’s New Privacy Risk Management Framework …
These end-to-end encryption tools help protect your data by ensuring only the parties at either end of the communication can read or use the message. They are a first step to ensuring your data and messages remain safe and secure.
End-to-end encryption is for more than just long-lived data. Sometimes the data that needs protecting is a simple, short string. Like secrets and passwords.
This week we look at two options for secure email: PGP and S/MIME. We also take a deep dive into a service provider that helps make secure messaging both possible and easy for end users.
End-to-end encryption is just as much about securing messages in transit from point A to B as it is securing data at rest in a file system between permitted times of access.
There are many end-to-end encrypted messaging systems available for secure, mobile communication. Each has its own advantages and disadvantages; understanding the way each works will help you decide which is right for you.