Story image

VeilMail: No leaks. No trail. No fail?

26 Aug 2014

Turner Technologies has vowed to provide “military strength” security protection across company communications, by introducing VeilMail to the market.

Branded as “No leaks. No trail. No fail”, Turner Technologies CEO Greg Roake says VeilMail is as “sophisticated and secure as electronic messaging can get.”

“Why VeilMail? Quite simply because conventional email isn’t secure,” he says. “Too many organisations have learnt the hard way that the cyber world is not secure.

Six years in the development, Roake says VeilMail works in a “completely different manner” to other supposedly secure electronic services.

Ensuring business communications go directly to the intended recipient, Roake says VeilMail can guarantee private messages do not go via traditional email servers.

Alluding to the common trail of sender to ISP provider to recipient, Roake says the solution effectively cuts out the middleman, an offering which continues to gain relevance as electronic spying and hacking becomes increasingly sophisticated.

“Companies dealing with confidential information need to be more vigilant,” Roake adds.

“Even if your IT infrastructure is secure, how can you be sure of the integrity of the recipient’s IT infrastructure? Or lack of it.”

But isn’t encrypted email secure?

“No,” claims Roake. “Someone other than the sender and recipient also holds the key, allowing the email to be decrypted along the way.

“Gone are email addresses and local storage, in are your own personally managed ISP, encryption in message transfer and for all information stored, as well as auto decryption.”

Roake says VeilMail offers “total control of correspondence”, subsequently providing a closed loop electronic communication which helps ensure no transmission trail or fail.

Available also from mobile devices, Roake believes all sectors of business that expect and need total privacy for their communication can benefit from the solution.

This includes enterprise level companies, high level corporates, government and banking institutions among others.

“We believe organisations should be able to conduct their business safe from hackers, spam and viruses,” adds Roake.

“We operate with the highest levels of integrity and aim to work with organisations operating under the same strict business ethics.

“Our goal is to allow business and government to keep their commercially sensitive information safe from prying eyes - and so enabling the building of successful, global organisations.”

For more information about VeilMail click here

Orange Belgium opens 1,000 sqm Antwerp data centre
It consists of more than 500 high-density 52 unit racks, installed on the equivalent of 12 tennis courts.
Time to build tech on the automobile, not the horse and cart
Nutanix’s Jeff Smith believes one of the core problems of businesses struggling to digitally ‘transform’ lies in the infrastructure they use, the data centre.
Cloud providers increasingly jumping into gaming market
Aa number of major cloud service providers are uniquely placed to capitalise on the lucrative cloud gaming market.
Intel building US’s first exascale supercomputer
Intel and the Department of Energy are building potentially the world’s first exascale supercomputer, capable of a quintillion calculations per second.
NVIDIA announces enterprise servers optimised for data science
“The rapid adoption of T4 on the world’s most popular business servers signals the start of a new era in enterprise computing."
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Storage is all the rage, and SmartNICs are the key
Mellanox’s Kevin Deierling shares the results from a new survey that identifies the key role of the network in boosting data centre performance.
Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.