Texas Department of Information Resources Selects Encryptics to Safeguard Data

Feb. 5, 2013
State’s first device-level email encryption protects sensitive communications

FRISCO, TX – Feb. 4, 2013 – Encryptics, a provider of patented data privacy and protection services for businesses and government, announced today that it has been selected by the Texas Department of Information Resources (DIR) to deploy the state government’s first implementation of device-level email encryption.

“The capabilities that the Encryptics solution brings to bear are an important element of our overall security strategy,” Karen W. Robinson, Chief Information Officer, State of Texas, said in the DIR’s case study about the implementation. 

Encryptics supports the DIR’s mission by providing:

  • Multi-layered security that protects information when it is in transit, in use and at rest.
  • Agency-wide implementation with no additional hardware that DIR must buy or maintain.
  • Cross-platform support for “bring-your-own-device” (BYOD) capabilities.
    • Robust Digital Rights Management (DRM) that gives the agency real-time control of who can see and share their digital content, and when.
    • Secure communications with any outside entity and the ability to receive encrypted messages and files in return. 
    • Continued ability to comply with freedom of information requests.

 Mitch Scherr, Chief Executive Officer of Encryptics, said: “Our team created the industry’s first Trusted-Peer-to-PeerTM platform, and we are very pleased that DIR selected our solution for robust yet cost-effective data protection.”

 The Encryptics solution can fit within existing IT infrastructures and can be deployed with no disruption to the work of employees.

 “The traditional trade-off is security versus business efficiency,” said Todd Kimbriel, DIR’s Director of DCS Services and eGovernment. “There are many ways to increase communication security, but there is always some measure of slowing down the communication process.  In DIR’s use of Encryptics, we found we could increase our security posture without sacrificing business efficiency