Secure Chorus Compliant Products

Secure Chorus Compliant Products

Secure Chorus’ work, based on its members’ and observers’ collaboration, has enabled the development of an ecosystem of Secure Chorus Compliant Products which are all based on a set of standards which provide specific features that are of great relevance for the secure processing of data in enterprise, in both the public and private sector.

All products provide for end-to-end encryption and can be used in any environment without needing trust in the underlying platforms, both at rest (e.g. storage) and in transit (e.g. network systems). However users are not locked-in by a specific vendor. Users of different brands of products can communicate with one another securely.

The technology can be centrally managed, giving the enterprise full control of the security of the system and therefore the ability to comply with any auditing requirements through a managed and logged process.

Secure Chorus’ KMS (Key Management Server) based approach allows domain managers to easily enable the processing of data between different user groups without bringing external user groups into the security perimeter of the organisation.

The standards use an identity based public key, removing the need for an expensive and complex supporting infrastructure for distributing credentials, allowing for at-scale implementation.

Secure Chorus’ standards support both real-time processing of data and deferred delivery of data. The standards are also agnostic to implementation and give organisations the complete freedom and flexibility to deploy platforms and infrastructure to meet their requirements
Since the specifications are known and open, it is possible to assess if the technology meets information assurance requirements.

Secure Chorus Compliant Products address several important communication requirements for the enterprise and public sector:

data-security

Data Security

END-TO-END ENCRYPTION

Can be used in any environment without needing trust, both at rest (e.g. storage) and in transit (e.g. network systems)

data-ownership

Data Ownership

ENTERPRISE CONTROLLED ACCESS TO DATA

Full control of the system security and ability to comply with any auditing requirements through a managed and logged process.

interoperability

Interoperability

KEY MANAGEMENT SERVER

Secure Chorus KMS approach simplifies inter-organisational communications, without bringing external users into internal security perimeters

scale

Scale

IDENTITY BASED PUBLIC KEY

Does not require expensive and complex supporting infrastructure for distributing credentials, allowing for at-scale implementation.

flexibility

Flexibility

REAL-TIME & DEFERRED COMMUNICATION

Supports both real-time communications (such as one-one and multi-party calls) and deferred delivery (such as messaging and voicemail).

implementation-agnostic

Implementation Agnostic

ANY PLATFORM OR INFRASTRUCTURE

Users have the freedom and flexibility to deploy platforms and infrastructure to meet their requirements.

Start typing and press Enter to search