5/26/2023 0 Comments Wickr me security![]() Retention can be customized for different groups of users or teams (Security Groups) depending upon internal policies and compliance requirements.In Wickr, administrators can enforce policies for message retention similar to email retention policies.What about enforcing strict retention policies and controls? For Wickr Me, finding users can be accomplished by searching for their Wickr Me username and adding to your contact list.For AWS Wickr, finding AWS Wickr contacts can be accomplished by searching for their email address and adding them to your contact list.From here, the app will show which of your contacts are on Wickr so you can communicate with them securely. When setting up your Wickr app for the first time, you’ll be prompted to allow the app to “Access Contacts”. With email you can import contact lists to connect to your existing contacts.I can easily connect with people using email, how easy is it to connect to Wickr users I want to communicate with? Once created (usually no more than 3 min), the network administrator sends emails inviting end users to download and activate their AWS Wickr apps on mobile or desktop. For AWS Wickr- the enterprise product - a network administrator starts by setting up an administrator account.For Wickr Me - the free consumer product - users simply create a username (Wickr ID) and a password.Much like setting up a new Gmail account, setting up a Wickr account is a straightforward process that takes just a few minutes.How easy is it to perform enterprise level management of Wickr vs email solutions? What’s the enterprise user experience like? Wickr encryption techniques - would take an average computer working 24x7x365 the lifetime of the universe to guess a single key and these keys are rotated per message.Wickr never has the ability to access data and can therefore never expose data sent through our product or service.Wickr user messages and files are encrypted 3-times: server-to-server, device-to-device, and user-to-user.If Wickr’s infrastructure is compromised, messages and files are never accessible.So while the risk isn't eliminated, it is mitigated with the use of Expiration and Burn On Read (BOR). It keeps data only for the length of time specified by the user.While Wickr stores encrypted files and encrypted messages, it does so with this in mind:.A compromise of email or other hosted communications solutions will expose message contents and files.What are the core security differences between a Secure Collaboration solution (Wickr) vs enterprise email and other forms of communication systems?
0 Comments
Leave a Reply. |