Welcome!

Artificial Intelligence Authors: Liz McMillan, Corey Roth, Yeshim Deniz, Pat Romanski, Elizabeth White

News Feed Item

ASG Software and Protected Trust Form Partnership

WINTER HAVEN, Fla., Dec. 12, 2012 /PRNewswire/ -- Two software companies are partnering to offer a simple yet secure means of transferring even the most sensitive data by email, providing protection for health information, patents, trade secrets, contracts, financial data and other confidential correspondence.

ASG Software Solutions, a Naples, FL-based provider of creative business software, and Protected Trust, a Winter Haven, FL-based data protection firm, are now offering a secure messaging platform that can be used separately or with ASG's Cypress Suite document assembly and delivery system, company officials announced. The products are called Protected Trust ASG-Cypress integration and Protected Trust Stand Alone.

"The  Protected Trust ASG-Cypress integration offers an unparalleled comprehensive document assembly and delivery solution" said Ingram Leedy, President of Protected Trust

Without security measures, emails can be intercepted, read, stored, altered, and copied without the sender's knowledge or permission. That means company and personal information is vulnerable to identity theft and other malicious attacks. Encrypting an email protects it during transmission by making it unreadable to unauthorized individuals.

Protected Trust, which provides one of the most secure email platforms available, has seamlessly integrated its message protection program into Cypress, ASG's powerful document system customized to the client's needs through product add-ons.

A key feature of the new security products is its simplicity: Users only need a little training to send secure messages, company officials said. Recipients don't have to register to open or reply to secured emails. Yet users can transmit emails without the file size limits of traditional email, safeguard messages with expiration dates, revoke messages, track messages in real time, and access secure messages with a free Microsoft Outlook add-in or with Protected Trust's web portal and a phone, tablet or computer.

Users also can meet, and beat, government requirements for privacy.

Protected Trust's end-to-end encryption protects messages before they leave the sender. Each user can require recipients to verify their identity before opening a protected document, making it possible to send invoices safely. Senders can receive proof the invoice has been delivered.  

In addition to being extremely secure, the Protected Trust platform is resilient and flexible.  Users can reduce fax machine usage, automate work flows, and reduce costs.

Both companies will be marketing Protected Trust Stand Alone, but Protected Trust ASG-Cypress integration will be available only through ASG.

ASG-Cypress Suite is a tool to help companies manage, access, analyze, and distribute content with little or no user training. It can capture and store any document, then build in metadata, rights, permissions and privileges.  These documents can be searched, retrieved, assembled and delivered by ASG-Cypress Suite. The Suite can assist with report distribution, forms management, the addition of non-digital documents, data mining, content processing and more.

More information can be obtained at www.asg.com and www.protectedtrust.com.

About ASG

ASG Software Solutions is a recognized leader in enterprise information technology and business software solutions. For more than 25 years, it has been serving 85 percent of the world's most complex IT organizations. ASG's creative software solutions reduce cost, mitigate risk and boost service throughout the work cycle. ASG is at the forefront of information technology innovation, helping companies with cloud computing, large data needs, mainframe challenges and more.

About Protected Trust

Protected Trust provides email protection services to federal, state and local government as well as to private industry. Protected Trust offers simple, flexible and secure communications, enabling companies to comply and even surpass the latest governmental standards for privacy.  Services range from email encryption to tracking and auditing communications.  The company was founded in 2010 by Elephant Outlook, a leading email security and compliance firm founded by Ingram Leedy.

SOURCE Protected Trust

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...