Egress Software

Last updated

Egress Software Technologies
IndustryComputer Software
Founded2007
Headquarters
London, UK
Key people
  • Tony Pepper (CEO)
  • Neil Larkins (COO)
  • Malcolm Locke (CFO)
  • John Goodyear (CTO)
Products
  • security software
  • egress switch
Website www.egress.com

Egress Software Technologies Ltd is a UK-based software company providing security software for e-mail, secure messaging, Document and Email Classification, and associated technologies to assist secure file sharing and handling. [1] [2]

Contents

History

Egress was founded in 2007 by Tony Pepper, Neil Larkins and John Goodyear. [3] In 2011 Egress was awarded the Security Innovation of the Year at the British Computer Society UK IT Industry Awards. [4] The company experienced an influx of customers following the introduction of the European Union’s General Data Protection Regulation in 2018. [5]

In June 2021, Egress acquired Aquilai Ltd. for an undisclosed price. [6]

In April 2024, cybersecurity awareness training vendor KnowBe4 announced the acquisition of Egress Software with "plans to deliver a single platform that aggregates threat intelligence dynamically, offering AI-based email security and training that is automatically tailored relative to risk." [7]

Products

Egress software is for the secure transfer of emails and documents to non-secure email addresses. [8]

Product certification and Agency approved listings

In October 2013, Egress Switch was certified by CESG against Desktop and Gateway Email Encryption Security Characteristics as part of their Commercial Product Assurance program. [9] Egress Protect is certified by the UK's NCSC to handle Official and Official Sensitive under the UK government security classifications policy. [2] As of April 2018 this certification lies with National Cyber Security Centre (NCSC) and eas extended until 20 December 2019. [10]

In May 2014, Egress Switch encryption services became available to procure via the G-Cloud 5 Framework, the UK Government's program committed to the adoption of Cloud services across the Public Sector. Through the G-Cloud Framework, Public Sector organizations are able to procure the following Egress Switch services: Switch Secure Email, Switch Secure File Transfer and Switch Secure Web Form via a number of Egress value added resellers. [11]

Also in May 2014, Egress Switch Secure Email was listed in the NATO Information Assurance Product Catalogue, which provides the 28 NATO nations, as well as their civil and military bodies, with a directory of Information Assurance products, protection profiles and packages that are in use or available for procurement to meet operational requirements. [12]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification. It is currently in version 3.1 revision 5.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

ISACA is an international professional association focused on IT governance. On its IRS filings, it is known as the Information Systems Audit and Control Association, although ISACA now goes by its acronym only. ISACA currently offers 8 certification programs, as well as other micro-certificates.

Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom.

SpiderOak Inc. is a US-based software company focused on satellite cybersecurity.

<span class="mw-page-title-main">Proofpoint, Inc.</span> American cybersecurity company

Proofpoint, Inc. is an American enterprise cybersecurity company based in Sunnyvale, California that provides software as a service and products for email security, identity threat defense, data loss prevention, electronic discovery, and email archiving.

<span class="mw-page-title-main">Mimecast</span> Jersey-domiciled information technology company

Mimecast Limited is an American–British, Jersey-domiciled company specializing in cloud-based email management for Microsoft Exchange and Microsoft Office 365, including security, archiving, and continuity services to protect business mail.

PKWARE, Inc. is an enterprise data protection software company that provides discovery, classification, masking and encryption software, along with data compression software. It is used by organizations in a range of industries including financial services, manufacturing, military, healthcare and government. The company's products are intended to assist other companies in complying with various data protection regulations such as GDPR and CCPA. The company is headquartered in Milwaukee, Wisconsin with additional offices in the US, UK, and India.

iSheriff is an Internet security software vendor that specializes in cloud-based security and compliance, with specialties in E-mail filtering, Web filters and endpoint security. The company is privately held and based in Redwood City, California. iSheriff sells their products through partners and distributors.

Kiteworks, formerly known as Accellion, Inc., is an American technology company that secures sensitive content communications over channels such as email, file share, file transfer, managed file transfer, web forms, and application programming interfaces. The company was founded in 1999 in Singapore and is now based in San Mateo, California.

The Chartered Institute of Information Security (CIISec), formerly the Institute of Information Security Professionals (IISP), is an independent, not-for-profit body governed by its members, with the principal objective of advancing the professionalism of information security practitioners and thereby the professionalism of the industry as a whole.

The United Kingdom has a diverse cyber security community, interconnected in a complex network.

Tresorit is a cloud storage platform that offers functions for administration, storage, synchronization, and transfer of data using end-to-end encryption. More than 13,000 companies use Tresorit to protect confidential data and share information securely. It is also used widely by Government organizations and NGOs as well as privacy-conscious individuals to protect sensitive data from unauthorized access and data-breaches. As of today, the encryption of Tresorit has never been hacked.

Cyber Essentials is a United Kingdom certification scheme designed to show an organisation has a minimum level of protection in cyber security through annual assessments to maintain certification.

The National Cyber Security Centre (NCSC) is an organisation of the United Kingdom Government that provides advice and support for the public and private sector in how to avoid computer security threats. It is the UK's National technical authority for cyber threats and Information Assurance Based in London, it became operational in October 2016, and its parent organisation is GCHQ.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

References

  1. Egress (2014). "About Us". Archived from the original on 7 March 2014. Retrieved 27 February 2014.{{cite web}}: CS1 maint: unfit URL (link)
  2. 1 2 GOV.UK (2021). "Cloud software : Search results : Egress". Gov.UK Digital Marketplace. Archived from the original on 15 November 2021. Retrieved 15 November 2021.{{cite web}}: CS1 maint: unfit URL (link)
  3. "Egress Software Technologies Limited". Companies House. People. Archived from the original on 19 April 2018. Retrieved 18 April 2014.
  4. BCS (2011). "2011 Technology Excellence Awards winners and medallists". Archived from the original on 4 March 2014.
  5. Cook, James (18 December 2018). "British cybersecurity company Egress raises $40 million to drive global expansion". The Telegraph . Retrieved 30 August 2021.
  6. Duncan Riley (2 June 2021). "Egress acquires anti-phishing provider Aquilai to strengthen its email security platform". Silicon Angle. Retrieved 21 November 2021.
  7. "KnowBe4 to Acquire Egress". Dark Reading. 24 April 2024. Retrieved 25 April 2024.
  8. "FAQs: Advice for recipients of Egress Switch emails". Children and Family Court Advisory and Support Service . Archived from the original on 18 April 2018. Retrieved 18 April 2018.
  9. "CPA certified products - Current Certified Products". Communications-Electronic Security Group (CESG). Archived from the original on 27 February 2014. Retrieved 27 February 2014.
  10. "Certified product - Egress Switch". NCSC. Archived from the original on 18 April 2018. Retrieved 18 April 2018.
  11. "Egress Switch available via G Cloud 5 framework". www.egress.com. Archived from the original on 5 June 2014. Retrieved 5 June 2014.
  12. "Egress Switch offers deep content inspection". www.egress.com. Archived from the original on 5 June 2014. Retrieved 5 June 2014.