Welcome!

Agile Computing Authors: Liz McMillan, Elizabeth White, Pat Romanski, Roger Strukhoff, Darren Anstee

Blog Feed Post

IONU Security Delivers Topic-Based MessagingTM and the Industry’s First Personal Device Management Capabilities

Longmont, CO, August 22, 2014 --(PR.com)-- IONU Security Inc., the worldwide leader in Transparent Security™, today announced the latest release of its secure messaging solution, InvisiMessageTM. This release of InvisiMessage delivers secure Topic-Based Messaging to IONU users.

Topic-Based Messaging combines the topic (aka: subject) structure that people are accustomed to with email with the convenience of text messaging. Topic-Based Messaging allows people to securely communicate and share attachments in the context of a topic, versus a series of threads assembled the participants. As messaging grows into a common platform for business, it will be essential to provide more of the capabilities that people are used to with email.

IONU InvisiMessage’s multi-platform support allows people to stay active in a topic whether they are using a mobile device or a personal computer, while knowing that their communications and attachments are completely secure. Users have the ability to “hide” messages that they are not currently following or opt of the message completely. Search capabilities allow messages to be found easily within a user’s set of messages.

InvisiMessage allows people to send and receive truly secure, encrypted messages and attachments and synchronized their messages across any number of a user’s secured computers or mobile devices. These devices can be any combination of Android, iOS, Windows or OS X devices. Additionally, users have the ability to control what happens when the recipient receives their message and attachment. Features such as Delivery and Read receipts, Vanish, Timed Vanish, Delete, Recall and Destroy give users insight and control over the lifespan of a message and its content.

In addition, this latest release of InvisiMessage delivers stability and performance enhancements, security advancements, search capabilities, user interface and experience updates and the industry’s first Personal Device Management capabilities.

Personal Device Management

Today, most people use more than one mobile device and several computers to support their daily interactions. Given this, the number of devices and computers that a person needs to manage and synchronize can become daunting. To simplify this, IONU’s User Administration Site provides Personal Device Management capabilities. These capabilities allow people to personally manage their user account and devices from a secure web portal that can be accessed from any web browser.

Unlike Mobile Device Management tools designed for companies to manage people’s mobile devices, IONU’s Personal Device Management capabilities were designed to allow individuals to manage all their IONU protected devices, both desktops and mobile devices.

For example, if a user’s mobile device is lost or stolen, the user can either disable or delete the device their account. All of the IONU protected messages and files on that device are left in a permanently encrypted state - encrypted with keys that are protected and inaccessible from outside the IONU system – and completely secure. This ensures that all of the information on the device is secure. If the device is found, the user can simply re-enable their device, and it will automatically synchronize with their latest messages. Users can also manage their global security and message settings, edit their profile and upgrade their accounts from the User Administration Site.

Contact:

To learn more about IONU and its products, please contact:

Mike Weir, Director of Marketing
[email protected]

For sales inquiries, please contact:

Email: [email protected]
Phone: (855) 613-1010 Ext. 718

For more information visit:

Website: http://www.ionu.com
Facebook: https://www.facebook.com/BecomeInvisible
LinkedIn: http://www.linkedin.com/company/ionu-security-inc
Twitter: https://twitter.com/IONUSecurityInc

About IONU Security, Inc.

IONU is the worldwide leader in Transparent Security™. From this position, IONU is delivering an integrated suite of secure mobile applications, desktop security applications, cloud-based file sharing, cloud-based storage and global administration capabilities. IONU’s solutions simultaneously address the security and data management focus of leading IT departments, while also providing the productivity benefits required by the user community.

IONU is allowing individuals, healthcare organizations and corporate enterprises to communicate privately and share and store files completely securely – no matter where that file travels throughout its lifecycle, even when being stored in the cloud with 3rd party providers where security is often of concern.

Contact Information:
IONU Security, Inc.
Michael Allman
330-987-8779
Contact via Email
https://ionu.com/

Read the full story here: http://www.pr.com/press-release/577411

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

@ThingsExpo Stories
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...