Overview
Challenges Email is the primary vector for cyberattacks and faces challenges with data leakage, insider threats, token high-jacking, phishing and credential theft.
-
Centralized Responsibility Security Model, data and keys vulnerable in the same system
-
No chain of custody for data, opens customer to compliance violations
-
Data access and network access joint hosted, network credentials give complete data access
-
Open to aging credentials, ransomware and man in the middle attacks, hijacking token and credentials to exfiltrate data
A cloud-based solution for zero trust data access (ZTDA) that encapsulates your data and delivers object level security.
- Shared Responsibility Security Model
- XQ Zero Trust Data technology allows the customer to keep exclusive control of the encryption keys
- Forensic level chain of custody and data sovereignty
- With a complete audit trail of every data object, XQ can be used to migrate, geofence, and protect data across disparate networks
- Mitigates risks from misconfiguration or bad internal actors
- Separates network access from data access
- Dynamic credentialing mitigates risks from ransomware and man in the middle attacks
- Protection and control travel externally with the data to blow up exfiltrated data
XQ Email elevates your communications to zero trust data access (ZTDA) by microsegmenting and encapsulating your data to control access beyond the boundaries of a single environment.
Cross Platform Outlook, Gmail and Beyond
- XQ Zero Trust Data Protection keeps your Gmail and Outlook messages safe and reduces operational risks, without sacrificing collaboration.
Ransomware Extortion
- XQ protects your data from double extortion, from phishing, credential theft, hijacked tokens and insider threats.
Compliance
- XQ data rights management (DRM) crosses boundaries between environments and creates a unique secure chain of custody for each data object for CMMC, HIPAA, NIST and more.
Features
Data Encapsulation
- XQ microsegments & encrypts data during transfer, meticulously tracking and controlling access at every stage of data's journey.
Remote Data Control
- Turn exfiltrated data into digital dust by destroying or suspending keys.
Data Sovereignty
- Data access controls and Data Loss Prevention policies enforce jurisdictional policies and geofence data access.
Simple Compliance
- XQ is built on the NIST standard and provides proof of secure chain of custody for each data object for global compliance standards.
US Dept. of Defense Zero Trust Data Policy
- The Department of Defense published a Zero Trust Strategy paper on November 7, 2022, with the new strategy representing a significant change in the approach to protecting data. XQ is the first company to have a Zero Trust Data solution that has all seven components as defined by the DoD.
GDPR Data Sovereignty Solution
- Organizations can meet data residency and localization requirements for GDPR by ensuring that data is stored locally and is accessed only in the country of origin. It is easily deployable across multiple systems and greatly reduces compliance and reporting requirements. Plus, organizations maintain a full chain of custody at the data packet level across disparate networks.
XQ Turnkey CMMC Solution
- Companies doing business with the U.S. Federal Government must meet updated CMMC regulations starting in 2023. XQ audit assistance shows how they protect Controlled Unclassified Information as well as Covered Defense Information, and the corresponding NIST 800-171/800-53 controls. With its partners, the XQ Email, Data Transfer and Cloud Storage Solution helps organizations meet or exceed ALL 110 NIST SP 800 - 171 controls and the corresponding DFARS controls.
Highlights
- Cross Platform Outlook, Gmail and Beyond - XQ Zero Trust Data Protection keeps your Gmail and Outlook messages safe and reduces operational risks, without sacrificing collaboration.
- Ransomware Extortion - XQ protects your data from double extortion, from phishing, credential theft, hijacked tokens and insider threats.
- Compliance - XQ data rights management (DRM) crosses boundaries between environments and creates a unique secure chain of custody for each data object for CMMC, HIPAA, NIST and more.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Business Plan | Secure communications to meet more business compliance standards. | $54.00 |
Vendor refund policy
No refunds, except as required by the AWS refund policy.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
XQ will respond within one business day. http://xqmsg.com support@xqmsg.com https://xqmsg.co/contact-us
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.