Secure Chorus’ work, based on its members’ and observers’ collaboration, has enabled the development of an ecosystem of Secure Chorus Compliant Products which are all based on a set of standards which provide specific features that are of great relevance for the secure processing of data in enterprise, in both the public and private sector.
All products provide for end-to-end encryption and can be used in a variety of environments, both at rest (e.g. storage) and in transit (e.g. network systems). However users are not locked-in by a specific vendor. Users of different brands of products can communicate with one another securely.
The technology can be centrally managed, giving the enterprise full control of the security of the system and therefore the ability to comply with any auditing requirements through a managed and logged process.
Secure Chorus’ KMS (Key Management Server) based approach allows domain managers to easily enable the processing of data between different user groups without bringing external user groups into the security perimeter of the organisation.
The standards use an identity based public key, removing the need for an expensive and complex supporting infrastructure for distributing credentials, allowing for at-scale implementation.
Secure Chorus’ standards support both real-time processing of data and deferred delivery of data. The standards are also agnostic to implementation and give organisations the complete freedom and flexibility to deploy platforms and infrastructure to meet their requirements
Since the specifications are known and open, it is possible to assess if the technology meets information assurance requirements.
Secure Chorus Compliant Products address several important communication requirements for the enterprise and public sector:
Does not require expensive and complex supporting infrastructure for distributing credentials, allowing for at-scale implementation.
Supports both real-time communications (such as one-one and multi-party calls) and deferred delivery (such as messaging and voicemail).
Users have the freedom and flexibility to deploy platforms and infrastructure to meet their requirements.