WhatsApp With India? – Council on Foreign Relations

Hey everyone, a quick note before we start the show. So some of our colleagues produced this amazing online presentation about the international refugee crisis, and it's been nominated for a Webby this year. I encourage you to check it out and if you like what you see, please vote for us. Voting closes on May 7th. So go to Vote.WebbyAwards.com and search for it by its title No Refugee. And thanks!

Ah, social media. Love it or hate it, we use it for almost everything. Staying in touch, buying things we need, buying things we dont need, following the news, even checking in during a disaster.

But entrusting these platforms with our information comes at a cost. The boundaries of our privacy have faded, and more and more we find ourselves asking, whos in charge? Is it legislators? Is it the platforms themselves? In the U.S. the answers to those questions are unclear.

But in India, a potentially decisive moment in digital freedom is going down right now. Indias ruling party has put forward new rules that would allow it to trace and censor private communication. Standing in its way is WhatsApp, an American-made, encrypted messaging platform that is used by hundreds of millions of Indians. And the outcome could have ripple effects across the globe.

Im Gabrielle Sierra, and this is Why It Matters. Today, Indias government versus WhatsApp, and the looming threat of digital authoritarianism.

Vindu GOEL: India is the world's largest democracy. If you can imagine, 900 million people voted in the last national election last year. Out of a population of 1.3 billion people, it's just a massive exercised election.

Seema MODY: Yeah, it's huge, it's populous, and that's what also makes it really fun and exciting to be on the ground. You certainly feel the energy, especially in a city like Mumbai.

GOEL: Politicians routinely insult each other on the campaign trail, criminals of every flavor run for office and win, so do Bollywood movie stars, cricket stars. It just never ends.

Chinmayi ARUN: India has always been a fairly chatty democracy. We talk a lot, we argue a lot, that's our culture.

Gabrielle SIERRA: Okay so help me understand why WhatsApp is such a big deal in India? How many people are actually using it there?

ARUN: Roughly 400 million.

SIERRA: That's a lot of people.

ARUN: It is indeed.

This is Chinmayi Arun, she is a resident fellow at Yale University, and the founder of a research center at National Law University in Delhi. Shes also a leading legal expert on the intersection between freedom of speech and technology.

SIERRA: And so why WhatsApp? Why not, you know, Instagram, or Snapchat?

ARUN: The elite platforms are used by everyone, but WhatsApp is the one that really appeals to people. If you have a phone that's not too fancy, if you don't speak English, you don't read, or you don't have access to an expensive data connection, you can still use WhatsApp. So it started with, "Hey, you don't have to spend one rupee or two rupees per text, you just save them up and then they send whenever you're in Wi-Fi." And so a lot of people with not a lot of money, which is many, many Indians, decided that this works for them. And then WhatsApp had these multimedia features which people started using and started liking. And I have mixed feelings about this because the good thing is that I get to talk to my grandma, and she finally has forgiven me for moving across the Atlantic, she can look at my home and say things about my plants or whatever.

SIERRA: Of course.

ARUN: But if you're sitting in an Indian airport and watching the number of people who do video calls, they sort of subject you to their conversations. Mixed feelings.

GOEL: WhatsApp is really a messaging platform, and that can be one-to-one messages like me sending a message to you, but it's also very commonly used in India for groups.

I am Vindu Goel, and I am a technology reporter for The New York Times based in Mumbai, India.

Vindu also covers Indian economics and culture, and has written extensively about free speech and misinformation under Indias ruling party. We called him at his home in Mumbai on WhatsApp.

GOEL: WhatsApp has become so embedded in life in India that people use it in their business transactions, so you can order groceries from your corner grocery store over WhatsApp. I buy an airline ticket from MakeMyTrip, which is one of the big online travel agencies. They send me a confirmation message on WhatsApp with my E-ticket details.

For those of us based outside of India, handling a basic transaction may require a few different platforms. You find out about a concert on Instagram, RSVP for it on Facebook, maybe share the notification on Twitter, buy your ticket on Ticketmaster, and receive the confirmation on Gmail. But for Indians, WhatsApp is often the one-stop-shop for everything.

In other words, an application from Silicon Valley has become basic infrastructure for the second-most populous nation on Earth. Thats a pretty big deal, and it helps illuminate why the government is pushing for greater control.

GOEL: WhatsApp was founded in 2009 by two former employees of Yahoo, its an American company, it was founded in Silicon Valley, and they basically built a very simple messaging service. It became very popular, and it caught the attention of Mark Zuckerberg, the chief executive and founder of Facebook. Zuckerberg decided in 2014 to buy WhatsApp and pay the still astonishing price of $22 billion for this messaging company.

SIERRA: Yikes. That's a lot.

GOEL: It's a lot.

LA Times: 0:05 - 0:10 Facebook is making a mobile push with its deal to buy real-time messaging service, WhatsApp.

CNN: 1:03 - 1:07 It's still an incredible price to pay for a company thats just a few years old.

ABC News: 1:34 - 1:44 It also makes tiny WhatsApp more valuable than some of the most established companies in the country, including American Airlines, Marriott Hotels, and Xerox.

MODY: And it came at a crucial moment for Facebook when it really was trying to find ways to diversify its revenue base, and also get in touch with more mobile users.

I'm Seema Mody, Global Markets Correspondent with CNBC Business News.

And suddenly came this messaging platform that was not only gaining prominence here in the U.S., but around the world. In fact, I believe that the average daily user rate on WhatsApp was much higher than Facebook Messenger. Facebook saw that and said, this is such a strategic bet for us, let's acquire it and find a way to really incorporate it into our user base and our platform.

SIERRA: But WhatsApp is free, right?

MODY: WhatsApp is free and I think this is still a developing story to see how Facebook is really trying to incorporate WhatsApp into its business, and will you one day see ads on WhatsApp? That's certainly been one of the big questions.

GOEL: Zuckerberg was prescient in that this technology of a very simple messaging app was going to become very popular. Today, WhatsApp has more than two billion users around the world. It is by far the most popular messaging app in the world, and one of its biggest claims to fame is it emphasizes privacy. All messages on the service use something called end-to-end encryption.

Okay so, in most cases when you send an email, or a text message, it gets encrypted. That means that the information inside is locked up in a code, so that outsiders cant read it. However, the service providers that pass your message along can read it - whether thats Apple, or Gmail, or Facebook, whoever. They all have the keys to that code. And that makes your message vulnerable.

Enter end-to-end encryption. With this technology, none of the middlemen have the keys. Only you and the person you are sending it to can break the code.

GOEL: WhatsApp can't read it, even if the government came knocking at the door of WhatsApp, WhatsApp would have nothing really to give them, and so your information is private.

SIERRA: And that makes it unique to other services, messaging services, like, whether you're sending a text message, or even Facebook Messenger where that information does live somewhere.

GOEL: Yeah. Most other messaging services in the world are not end-to-end encrypted, and certainly none of the really popular ones. But WhatsApp has made it really easy, you don't have to think about encryption. It just is encrypted.

Because so much of Indias communication happens on WhatsApp, end-to-end encryption has made it very difficult for the government to investigate messages, in the name of national security.

ARUN: People are not making phone calls anymore. They're not even walking over to their neighbor and saying things, they're just texting them. And where there is speech, there is harmful speech.

Its not news that social media can bring out the worst in people. The platforms we use every day are teeming with sexism, racism, misinformation, and violent ideologies.

Its the same in India, where social media has amplified problems that are a lot older than the Internet.

PBS NewsHour: 0:00 - 0:06 Rumors and lies spread like wildfire across the internet, including across chat applications like WhatsApp.

Al Jazeera: 2:13 - 2:20 There are many first time users in India who think that whatever comes in their WhatsApp inbox, is true.

ARUN: The one that's really made the headlines is that there was a lot of vicious hate speech circulating on WhatsApp. So for example, the Muslim community is under quite a lot of pressure in India right now and it's really sad. One of the ways in which they're discriminated against is that some upper-caste Hindus, don't eat beef. And so the rumor circulating on WhatsApp will say things like, "X has beef in his fridge." Or, "Y is his transporting a cow carcass." And since it's already been sold to people as a threat to their religion, when a rumor like that reaches people that already feel threatened, and feel like these people are out to get all the Hindus, and they're trying to destroy our religion by eating beef, and lynch mobs attack them.

SIERRA: Wow.

ARUN: And they're popularly called the WhatsApp lynchings.

GOEL: In early 2018, there was a wave of false messages on WhatsApp about child kidnappers prowling various parts of India trying to steal people's children, and this panicked a lot of people and mobs attacked strangers in various parts of India and killed them. Beat them to death, tied them up, hung them, all kinds of terrible things. More than 20 people died in just a span of a few months because of these rumors. And after these rumors started appearing, the central government, went after WhatsApp and said, "You need to find a way to trace these messages and stop these messages." And this set up a feud with WhatsApp that has still not been resolved.

The government says it doesn't want to read your messages, the government says they don't want to spy on the content of messages. They're not asking WhatsApp to break the encryption of messages and just show them what's in the messages, but what they are saying is, "You need to be able to trace back the pathway of a message, and you have to find a way to do that because if some message goes viral, we want to find out who sent it." And we'll see what happens. I mean, WhatsApp has said that to do that would require significant changes to their service and they haven't said whether they'd be willing to make such changes to their service.

And that brings us back to the rule changes that the Indian government is proposing. The draft hasnt been finalized, but the current language would require platforms such as Facebook, Instagram, WhatsApp, TikTok, and others to remove unlawful posts, and trace their origins within 72 hours of a request.

This sounds pretty reasonable. If misinformation on a private social media platform is leading to real-life violence, the need to have an authority step in and offer regulation seems like a rational impulse.

Still, context matters, and before we go any further, its probably a good idea to learn a bit more about Indias ruling party, popularly known as the BJP, which some critics have described as authoritarian and ethno-nationalist.

SIERRA: Can you tell me a little bit just about the ruling party in India, and how they interact with social media?

ARUN: So, the ruling party in India was known for their use of social media, modeled on the Obama campaign, by the way. And so there's a part of it in which they've been much lauded for taking to the social media and sort of modernizing Indian politics that way. It's also known for a huge rise in the number of Internet shutdowns. So it's interesting because they take pride in being accessible to people on social media, but at the same time, are quite controlling of it.

SIERRA: It sounds like they know how powerful it is.

ARUN: Yes, it does.

SIERRA: So, what do you mean by Internet shutdowns? Like, they're just completely shutting down access to everybody in a certain place for a certain amount of time?

ARUN: Yes, what I mean by an Internet shutdown is, a shutdown of all Internet services, but typically also telephone services, so basically it's a full communications shutdown.

SIERRA: That's crazy, and scary. And how do people react to something like that?

ARUN: Fury, mostly. My colleagues and I have been tracking this from when it started in Kashmir years ago. For the Kashmiris, it's terrible, because they're stuck completely cut off from the rest of India and from the rest of the world.

The story of Kashmir could take up an episode on its own. We dont want to oversimplify, so check our show notes for the full story. Kashmir is a Muslim-majority region between India and Pakistan that the two nuclear states have been fighting over since 1947. Tensions have led to war four times already. In order to tamp down dissent, the BJP shut down the Internet in Kashmir for more than 200 days. This is just one example of how far theyre willing to go in order to control the flow of information online.

GOEL: The BJP is very good at winning elections, and one of the skills that its really mastered is how to use social media to disseminate misinformation. They have factories, people who are essentially creating content to put out every day. Some of it's true, some of it's false, some of it's half true. There's a certain irony about a BJP-led government seeking help from WhatsApp to crack down on misinformation when, in fact, the very same government is the source of much of the misinformation that moves on WhatsApp.

SIERRA: So, you don't buy the argument that the only reason the government wants traceability is to stamp out dangerous disinformation?

GOEL: No. The Indian government has used surveillance against dissidents in Kashmir. People widely believe that cell phones are tapped, that SMS messages are being read by the government. There's a huge sort of black budget for various kinds of surveillance operations that the government does, and they do it in the name of national security, they say they're finding terrorists, much like the United States government that does a lot of surveillance in the name of national security. And the laws are quite broad in India. It essentially gives the government the right to do surveillance for pretty much any reason it pleases, and so no one really trusts that it would only be used for good and noble purposes.

Watchdogs in India have been concerned about the constitutional right to privacy for a long time. Some critics see the latest push by the BJP as part of a larger consolidation of power and a shift towards a Hindu nationalist agenda. Theyre concerned that new surveillance tools will be used in discriminatory ways.

GOEL: The request that WhatsApp provide a way to trace messages as part of a broader set of rules that the Indian government wants to impose on internet companies, these rules would also require companies to more closely monitor for certain kinds of content, would give the government power to require the removal of content that it considered threatening to the state or public order, a variety of rather open-ended justifications. And so the risk, the concern that a lot of people have is that essentially this will give the government the power to censor anything at once and force the internet companies to comply.

SIERRA: So, in response, has WhatsApp done any other things? Have they made other moves to sort of placate this request and say, look, we're taking care of this misinformation that is truly leading to people dying?

GOEL: Yes. So, one step they took was to limit the number of people or groups you could forward a message to, to five. People would get some exciting message or people would get some threatening message and say, "I need to let everybody I know, know about this," without really thinking about whether it's true or not, or knowing, and then all of a sudden this forward shows up and you don't really know where it came from, and it goes viral. And so the idea was to slow the speed, slow the dissemination. And they tested that in India and they found it worked so well that they've now rolled it out globally.

In fact, since we interviewed Vindu, WhatsApp has made further restrictions. When a user receives a message that has already been forwarded five times, they can now only send it to a single person or group. The changes are aimed at stemming the flow of viral misinformation about COVID-19.

SIERRA: I mean, it sounds like WhatsApp is making efforts to address these issues just without breaking encryption. That seems to be the main thing that they're refusing to do at this point.

ARUN: So far. I believe that they're now under pressure to break encryption also. And that's why I said they're in a hard place, because if it comes to that, if it comes to either leave the country or break encryption, the question is, are they going to give up all the big money, the big market, or are they going to break encryption?

SIERRA: So, what will happen if WhatsApp refuses?

ARUN: So I think if you asked WhatsApp the answer to this question, they'll say, "Well, another player will move in." I don't think that it'll be as easy or as smooth, because WhatsApp offers functionality that not all platforms do. And the second thing we don't know, because WhatsApp has never tried it, is that how far will the public be okay with this? So if you tell the Indian public that, basically, the Indian government said enable surveillance or leave, and therefore none of you have WhatsApp anymore in this enormous country with fairly rebellious people. It would be interesting to see how that lands.

SIERRA: So, what is at stake for Indians as this all plays out?

ARUN: One is that it kills all the wonderful things that the Internet brought to India. All the young women that learned to rebel quietly. The organizing, people who learned because they were a part of WhatsApp groups that helped educate them, as I told you in the beginning, human communication moved to WhatsApp. And the thing is that India has always been a fairly chatty democracy. We talk a lot, we argue a lot, that's our culture. Amartya Sen's written about it, and he said, "We didn't need free speech to create public discourse in India. It was always a thing. We were always arguing and talking." And we've never had a state that's been able to monitor that end-to-end. Now that our communication's moved online, and one private company holds it all, if that private company chooses to share that communication with the government for the first time possibly in Indian history, the Indian government will be able to conduct mass surveillance in India. And so the question is, what will that do to both the Indian formal democracy, but also the democratic spirit of India.

GOEL: If there is censorship on a wide scale you're really going to see a weakening, perhaps crushing over time, of that democratic spirit. India will move more in the direction of China where the government decides which information gets out there, and every once in a while somebody finds a way around the censors and posts information that the government doesn't want them to post. That's the risk with India, is the government becomes the source of information and you lose some of these other sources of information.

As a reminder, there are 1.3 billion people living in Indians. 1.3 billion people whose freedoms could be eroded. And the decision that goes down in India wont just stay there. It could shape the digital freedoms of people all across the world in the years to come.

GOEL: So, the precedent that this would set, if WhatsApp added traceability, is India would not be the only country to ask. Other countries would ask. Once it's there, anybody can ask for it.

ARUN: It could be the beginning of a movement. And so, Pakistan has introduced a new draconian law recently that appears to be modeled on the Indian one. In fact, my Pakistani friends and I joke that our countries sometimes borrow the worst ideas from each other. So there's that. There's Kenya, that used India's digital ID system, and may feel like they can do this too, with WhatsApp. I believe that Israel and Brazil have also had what they might term as WhatsApp problems. And so, you might have a copycat situation, of many countries' authoritarian rulers feeling that, "Well, if WhatsApp gives way here, it will give way in my country too." So that's the digital rights problem, that it could spread, and you end up with authoritarian countries around the world, and that's dangerous for everyone.

Its still unclear how and when the new rules will be implemented, but the twist is that a big part of the outcome rests in the hands of a private American company. WhatsApp could comply with the request, they could attempt to negotiate and compromise, or they could just refuse, and see whether the Indian government would truly push them out of the country.

MODY: I think when you're that big, you do inherit some level of responsibility to set the standard and ensure you're not just trying to monetize a country's populous nation, and instead are coming in to try to really work with the country, to do the right thing. I think as a company, you could argue, if they come into a foreign country, they should be trying to do more good than bad. And it's interesting, if you look at the CEOs of some of the most powerful tech companies in the last two years, the number of trips individuals like Mark Zuckerberg, Tim Cook, Jeff Bezos have taken to India to spend time with Prime Minister Modi and really try to build up their personal relationship with the Indian leader, I think it just speaks to how much they see India as such a big opportunity, but also to the big challenges they're facing on the ground.

SIERRA: But the ultimate draw is just the market size?

MODY: I think that's exactly what it is. 1.3 billion people, half of which are under the age of 25. These companies see this as a huge opportunity, especially at a time when China's economy is slowing down, you look at India as that next big bet in Asia.

GOEL: I think that all of these companies have become very powerful. We use their services, we trust lots of information to them. Sometimes they treat it with great respect, sometimes they abuse that trust, and people are distrustful of the tech companies as much as they're also distrustful of the government. Tech firms need to figure out how to address some of these very real concerns raised by governments without fundamentally altering the nature of the product. I'm not sure it's possible. The attitude in Silicon Valley for a long time was, "We're not going to help. We don't want to help." Twitter quite famously called itself the free speech wing of the free speech party. They don't say that very much anymore, because it's complicated, right? So, Twitter became this cesspool of trolls and attacks and all kinds of nasty stuff, and they were losing users and they had a bad reputation among a lot of people and they realized that they have to figure out how to draw lines. But where do you draw the lines? There's no easy solutions. This technology has in many ways gone out of control, no one can really control it, even the companies themselves have trouble controlling how it's used.

SIERRA: Right. I mean in an ideal world if every government was just perfect and amazing and benevolent, of course they should be a part of this, and of course they should be helping monitor something that is so out of control, but you can't trust that everybody has the best interests at heart and wouldn't take advantage of a situation. And it sounds like there's just no easy answers for these things.

GOEL: No. I mean, these are democracies, right? Autocracies are even worse, but even in a democracy, even in a democracy like India, a democracy like the United States, there's always an opposition, and whoever's in power is going to be tempted to use these tools to hurt the opposition. It's just the nature of politics and the nature of temptation.

Our freedoms are increasingly expressed and exercised online. And by concentrating our freedom of speech online, we have also made it more susceptible than ever before to surveillance and censorship.

Nobody knows the right way to deal with this, and the argument isbeing hashed out, in different ways, all over the world.

Soon well hear what the worlds biggest democracy has to say.

As we mentioned throughout the episode, there is a whole lot more to learn about India, WhatsApp, and everything else that plays into this complex topic. So visit CFR.org/Whyitmatters and take a look at the show notes, we added a bunch of really great stuff to take a deeper look.

Interested in saying hi to the Why It Matters team? Send us an email at whyitmatters@cfr.org.

Be sure to subscribe to the show on Apple Podcasts, Spotify, Stitcher, or wherever you get your audio. And if you like the show, leave us a review!

See the article here:
WhatsApp With India? - Council on Foreign Relations

Lectrosonics Introduces the DPR Digital Plug-on Transmitter and the DSQD/AES-3 Receiver – The Light Sound Journal

Lectrosonics is very pleased to introduce the two newest members of the D Squared digital wireless family, the new DPR digital plug-on transmitter and the DSQD/AES-3 receiver.

The next extension of the D Squared wireless family platform which premiered in 2019, the DPR digital plug-on transmitter is fully compatible with the DSQD digital receiver and features a tuning range of 470 to 608 MHz (470 to 614 MHz for the export version). The new transmitter includes specially developed, high efficiency circuitry for extended operating time on two AA batteries, and offers RF power selections at 25 and 50 mW. The pure digital architecture enables AES 256-CTR encryption for high level security applications. Phantom power is selectable to off, 5v, 15v or 48v to accommodate a wide range of microphone types, from dynamic to studio condensers and shotgun mics. Studio quality audio performance is assured by high quality components in the preamp, wide range input gain adjustment and DSP-controlled analog limiting. Input gain is adjustable over a 55 dB range in 1 dB steps to allow an exact match to the input signal level, maximizing audio dynamic range and signal to noise ratio. The two-way IR port ensures quick setup and allows for encryption key transfer and other data sharing between units.

The DPR can be configured as either a transmitter or a recorder, with files stored on microSD card memory in the industry standard Broadcast Wave .wav (BWF) format at 24 bits, 48 kHz sample rate. A 3.5mm TRS jack on the side of the unit allows jam sync with timecode, making audio file alignment quick and easy in post-production. Timecode accuracy is better than 1PPM due to the temperature compensated crystal (TCXO) clock. The microSD memory card can also be used to update the units firmware in the field. The DPR also responds to remote dweedle tone commands, available via 3rd party apps such as New Endians LectroRM and PDRRemote, allowing users to change settings including frequency, audio level, lock/unlock, and also to start and stop recordings.

The durable, machined aluminum DPR housing is the same size and shape as the previous generation plug-on units including the HM and HMa so that standard accessories are compatible with the new unit, including the PHTRAN3 pouch and the HMCVR silicone cover. The input wiring is also the same as previous generations, allowing the use of existing cable and barrel adapter accessories including the MCA5X and MCA-M30.

With an audio frequency response of 25 Hz to 20 kHz +0.0, 3dB, a dynamic range of 110 dB before limiting, and a flat in-band phase response, the DPR is ideal for use as a wireless test and measurement link with calibrated microphones, for audio system alignment and monitoring.

The new DSQD/AES3 digital receiver is a four-channel, half-rack design with high-resolution color display, analog or AES digital outputs, and rear BNC antenna ports with loop-thru buffered BNC outputs to another receiver. The new receiver is compatible with the latest Lectrosonics all-digital transmitters including the DPR plug-on unit, the DBu beltpack unit, the DHu handheld transmitter, the stereo DCHT, and the half-rack M2T. The DSQD/AES3 is also backward compatible with any Digital Hybrid Wireless transmitters including the SM Series, LT, HM Series, SSM, HH Series, UM400, UM400a, LM Series, MM Series, and WM. Three different receiver diversity schemes can be employed depending on the needs of the application, including switched (during packet headers for seamless audio), Digital Ratio Diversity, or Digital Frequency Diversity. Continuously tunable tracking filters ensure excellent RF performance even in difficult environments. The DSQD/AES3 includes digital talkback capability when used with any talkback-enabled transmitter, such as the digital DBu and DHu, and the Digital Hybrid LMb, LT and HHa transmitters.

A headphone jack is included on the DSQD/AES3 for audio monitoring per channel. Ethernet and USB ports allow the receiver to connect to Lectrosonics Wireless Designer software for programming and monitoring. Antenna bias power can be engaged in the menu, and front panel LEDs show the status. Each DSQD/AES3 ships with half the rack hardware needed to mount two units together, yielding 8 channels in 1RU.

Both the DPR and the DSQD/AES3 support encryption in a 256 bit AES, CTR mode format for robust security, meeting FIPS 197 and 140-2 standards. Three different key management modes can be employed, including Universal where all units in the D Squared family share the same key, Shared where a unique key is created and can be shared between transmitters and between transmitters and receivers, and Standard where a unique key is created but cannot be shared between transmitters or from transmitters to receivers.

Availability: Q3, 2020

Info: http://www.lectrosonics.com

View original post here:
Lectrosonics Introduces the DPR Digital Plug-on Transmitter and the DSQD/AES-3 Receiver - The Light Sound Journal

Google Meet is now free: Here are 7 key features of Zoom alternative – Silicon Canals

During the COVID-19 pandemic, a majority of companies across the world are urging their employees to work from home. This new trend has resulted in heavy demand in the video conferencing tools as this is an efficient way to stay connected with staff while they work remotely. To catch up on the trend, Google came up with Google Meet, which is a video conferencing app and a business version of Hangouts.

Google Meet is ideal for businesses of any size and is integrated with G Suite versions of Gmail and Google Calendar. The Google Meet service shows the complete list of participants and lets users scheduled meetings in advance.

Recently, Google announced that Google Meet will be free for users until September 30, 2020. Previously, it was available only for the paid customers of G Suite. While anyone could join a meeting, it was mandatory to have a G Suite membership to host a meeting. As the service is made free for a limited time period, anyone can host meetings with up to 100 participants for up to 60 minutes.

This announcement comes at a time when Zoom, which has become a household name during the COVID-19 lockdown across the world. Having said that, here we list the key Google Meet features that make it is an efficient Zoom alternative.

The expanded tiled layout of Google Meet supports up to 16 participants simultaneously. Previously, the tiled layout supported only up to four participants at a time. Furthermore, Google has revealed that it will add additional video layout options and support larger meetings with more participants soon. As of now, this expanded 4 x 4 tiled layout is applicable only on the web client and is expected to bring the support to other devices and clients soon.

The next notable feature is that Google has added the ability for users to share high-quality videos with audio but in a different way. Instead of letting users share an app or the whole desktop, Google Meet supports sharing a single Chrome tag. This feature is touted to provide a better user experience for remote viewers. The service is already rolling out the support for the present a Chrome tab feature.

Google Meet has added a low-light mode to its mobile version. This mode brightens the video of the users if there is not enough ambient lighting. Google claims that it will roll out the low-light mode to the web version of the video conferencing app.

There is intelligent background noise cancellation that lets Google Meet users eliminate unwanted background noise during their conversation. This way, you can limit interruptions such as keystrokes or dog barking sound. Initially, it will be rolled out to the web version and later will be extended to the mobile version.

Google Meet employs an array of counter-abuse protections that keep your meetings safe. There are anti-hijacking measures for both dial-ins and web meetings. These make it difficult for individuals to guess the ID of a meeting and make an unauthorised attempt to join it. This is done by using codes of 10 characters. And, there is a limit wherein external participants cannot join a meeting more than 15 minutes in advance.

To make sure only authorised users to administer and access Google Meet, the video conferencing tool supports multiple two-step verification options for accounts that are convenient and secure. This includes phone-based and hardware security keys and Google prompt. Google Meet users can also enroll their account in the Advanced Protection Program (APP) that provides strongest protections against phishing and account hijacking. This is meant to protect the highest-risk accounts.

Google Meet data is encrypted by default thereby protecting the video meetings between the client and Google on both web and Android and iOS apps. Google Meet generates a unique encryption key that lasts as long as the meeting lasts. This encryption key is never stored to disk and is transmitted via a secured and encrypted RPC (Remote Procedure Call).

Main image picture credits: Google Meet

Stay tuned toSilicon Canalsfor more European technology news.

See original here:
Google Meet is now free: Here are 7 key features of Zoom alternative - Silicon Canals

Insights into the United States Hardware Encryption Market to 2026 – Opportunity Analysis and Industry Forecast – Yahoo Finance

Dublin, May 05, 2020 (GLOBE NEWSWIRE) -- The "U.S. Hardware Encryption Market by Algorithm & Standard, Architecture and Field-Programmable Gate Array, Product, Application, and End Use: Opportunity Analysis and Industry Forecast, 2019-2026" report has been added to ResearchAndMarkets.com's offering.

Hardware encryption is a hardware-based technique which is used for securing digital data. There are two forms of encryption; hardware-based encryption and software-based encryption. Hardware encryption uses a processor that contains random number of generators to generate encryption key. The key advantage of hardware-based solutions is that they eliminate the typical drawbacks of software-based solutions such as performance degradation for attacks aimed at the encryption key stored in memory. In hardware encryption, the security parameters and safeguard keys enhance the performance of encryption. These security parameters protect the encryption from cold boots and brute force attacks. Hardware encryption is a cost-effective method that holds diverse applications in securing data efficiently.

Increase in regulatory compliances regarding protection of private & sensitive data and reduction in prices of hardware encryption devices majorly drive the growth of the market. Moreover, factors such as increase in concerns related to data security and privacy, growth of the consumer electronics such as smartphones and tablets and an increase in complexity & volume of data breaches and brute force attacks drive the growth of the market. However, high capital investment and limited use of encrypted devices in the U.S. hinder the market growth. On the contrary, widespread adoption of Internet of Things (IoT) technology and cloud services as well as technological advancement on encryption chip are anticipated to offer lucrative opportunities for the market.

The U.S. hardware encryption market is segmented into algorithm & standard, architecture, product, application, and end use. Depending on algorithm and standard, the market is bifurcated into Rivest, Shamir, and Adelman (RSA), Advanced Encryption Standard (AES), and others. On the basis of architecture, it is classified into Application-Specific Integrated Circuit (ASIC) and Field-Programmable Gate Array (FPGA). The product segment includes Hard Disk Drive (HDD), Solid State Drives (SSD), Universal Serial Bus (USB), and incline network encryptor. By application, the market is categorized into consumer electronics, IT & telecom, automotive & transportation, aerospace and defense, healthcare and others. The end use segment is segregated into industrial, commercial, residential, and government.

Key Benefits

Key Market Players

Key Findings of the Study

Key Topics Covered:

1. Introduction

2. Executive Summary

3. Market Overview3.1. Market Definition And Scope3.2. Porter's Five Forces Analysis3.3. Market Dynamics3.3.1. Drivers3.3.1.1. Increase In Regulatory Compliances Regarding Protection of Private & Sensitive Data3.3.1.2. Decline In Prices of Hardware Encryption Devices3.3.1.3. Growth of The Consumer Electronics Such As Smartphones And Tablets3.3.1.4. Increase In Complexity & Volume of Data Breaches And Brute Force Attacks3.3.2. Restraints3.3.2.1. High Capital Investment3.3.2.2. Limiting The Use of Encrypted Devices In The U.S.3.3.3. Opportunities3.3.3.1. Widespread Adoption of Internet of Things (Iot) Technology And Cloud Services3.3.3.2. Ongoing Technological Advancement In Encryption Chip3.4. Case Studies3.4.1. Case Study 013.4.2. Case Study 023.5. Impact of Government Regulations On The U.S. Hardware Encryption Market

4. U.S. Hardware Encryption Market, By Algorithm And Standard4.1. Overview4.2. Rsa4.2.1. Key Market Trends, Growth Factors, And Opportunities4.2.2. Market Size And Forecast4.3. Aes4.3.1. Key Market Trends, Growth Factors, And Opportunities4.3.2. Market Size And Forecast4.4. Other4.4.1. Key Market Trends, Growth Factors, And Opportunities4.4.2. Market Size And Forecast

5. U.S. Hardware Encryption Market, By Architecture5.1. Overview5.2. Asic5.2.1. Key Market Trends, Growth Factors, And Opportunities5.2.2. Market Size And Forecast5.3. Fpga5.3.1. Key Market Trends, Growth Factors, And Opportunities5.3.2. Market Size And Forecast

6. U.S. Hardware Encryption Market, By Product6.1. Overview6.2. Hard Disk Drive (Hdd)6.2.1. Key Market Trends, Growth Factors, And Opportunities6.2.2. Market Size And Forecast6.2.2.1. External Hard Disk Drive6.2.2.2. Internal Hard Disk Drive6.3. Solid State Drive (Ssd)6.3.1. Key Market Trends, Growth Factors, And Opportunities6.3.2. Market Size And Forecast6.4. Usb Flash Drive6.4.1. Key Market Trends, Growth Factors, And Opportunities6.4.2. Market Size And Forecast6.4.2.1. Up To 4Gb6.4.2.2. 5Gb To 16Gb6.4.2.3. 17Gb To 64Gb6.4.2.4. 65Gb And Above6.5. Inline Network Encryptors (Ine)6.5.1. Key Market Trends, Growth Factors, And Opportunities6.5.2. Market Size And Forecast

7. U.S. Hardware Encryption Market, By Application7.1. Overview7.2. Consumer Electronics7.2.1. Key Market Trends, Growth Factors, And Opportunities7.2.2. Market Size And Forecast7.3. It And Telecom7.3.1. Key Market Trends, Growth Factors, And Opportunities7.3.2. Market Size And Forecast7.4. Automotive And Transportation7.4.1. Key Market Trends, Growth Factors, And Opportunities7.4.2. Market Size And Forecast7.5. Aerospace & Defense7.5.1. Key Market Trends, Growth Factors, And Opportunities7.5.2. Market Size And Forecast7.6. Healthcare7.6.1. Key Market Trends, Growth Factors, And Opportunities7.6.2. Market Size And Forecast7.7. Others7.7.1. Key Market Trends, Growth Factors, And Opportunities7.7.2. Market Size And Forecast

8. U.S. Hardware Encryption Market, By End Use8.1. Overview8.2. Industrial8.2.1. Key Market Trends, Growth Factors, And Opportunities8.2.2. Market Size And Forecast8.3. Commercial8.3.1. Key Market Trends, Growth Factors, And Opportunities8.3.2. Market Size And Forecast8.4. Residential8.4.1. Key Market Trends, Growth Factors, And Opportunities8.4.2. Market Size And Forecast8.5. Government8.5.1. Key Market Trends, Growth Factors, And Opportunities8.5.2. Market Size And Forecast

9. Competitive Landscape9.1. Market Share Analysis9.2. Competitive Dashboard9.3. Top Winning Strategies9.4. Key Developments9.4.1. New Product Launches9.4.2. Partnership9.4.3. Collaboration9.4.4. Acquisition9.4.5. Product Development

10. Company Profiles10.1. International Business Machines Corporation10.1.1. Company Overview10.1.2. Key Executives10.1.3. Company Snapshot10.1.4. Operating Business Segments10.1.5. Product Portfolio10.1.6. R&D Expenditure10.1.7. Business Performance10.1.8. Key Strategic Moves And Developments10.2. Kingston Technology Company, Inc.10.3. Mcafee, Llc.10.4. Micron Technology, Inc.10.5. Netapp10.6. Samsung Electronics Co., Ltd.10.7. Seagate Technology Llc10.8. Symantec Corporation10.9. Toshiba Corporation10.10. Western Digital Technologies, Inc.

For more information about this report visit https://www.researchandmarkets.com/r/c9w4bi

Story continues

Research and Markets also offers Custom Research services providing focused, comprehensive and tailored research.

CONTACT: ResearchAndMarkets.comLaura Wood, Senior Press Managerpress@researchandmarkets.comFor E.S.T Office Hours Call 1-917-300-0470For U.S./CAN Toll Free Call 1-800-526-8630For GMT Office Hours Call +353-1-416-8900

Excerpt from:
Insights into the United States Hardware Encryption Market to 2026 - Opportunity Analysis and Industry Forecast - Yahoo Finance

Global Encryption Software Market Expected to reach highest CAGR by 2025: Dell , Eset , Gemalto , IBM , Mcafee – Cole of Duty

The main purpose of this report is to provide an in depth analysis of the global Encryption Software market including all the stakeholders in the industry. The research report presents forecasted market size and trends on the basis of past and present status of the industry. Also to understand, the analysis of complicated data is presented in simple language. Report gives in depth analysis of all the aspects of the market industry. The report includes the study of major players that includes market followers, leaders and new entrants by regions and countries. Furthermore, report offers the current technological innovations affecting the growth of the market in the long term.

In addition, report covers all challenges for the players and risk factor which ae responsible for restraining the growth of the market over the forecast period. Some essential tools for the market movements such as PORTER, PESTEL and SVOR analysis have been presented in this report with potential impact of economic factors by regions on the market. Also in terms of revenue, report helps to estimate the CAGR of the market size of upcoming five years on the basis of historic data study.

This study covers following key players:DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshield

Request a sample of this report @ https://www.orbismarketreports.com/sample-request/83040?utm_source=Pooja

Furthermore, report helps to analyse internal as well as external factors that might affect the global Encryption Software market business positively or negatively. Therefore report offers a clear revolutionary view of the industry in advance. Report also helps users to understand the various dynamics of the global Encryption Software market. In addition, report provides structure of the market by analysing the segments such as product type, application, end users, key regions and key companies. Also report projects the market size of Encryption Software. In addition, research report on global Encryption Software market offers clear representation of the key players which are functioning in the industry.

Access Complete Report @ https://www.orbismarketreports.com/global-encryption-software-market-growth-analysis-by-trends-and-forecast-2019-2025?utm_source=Pooja

Market segment by Type, the product can be split into On-premisesCloud

Market segment by Application, split into Disk encryptionFile/folder encryptionDatabase encryptionCommunication encryptionCloud encryption

Report provides competitive analysis of the small and large players. Also report gives in detailed information about the players on the basis of type, financial position, price, growth strategies, product portfolio and regional presence of the players in the global Encryption Software market. Report also covers the key regions which are likely to have great market growth over the forecast period. The major regions are North America, South America, Europe, Asia-pacific and Middle East Africa. The initiatives taken by the government, universities and policy makers to promote the global Encryption Software market in the form of grants, funds and investments into the development of the market are commendable. This initiatives are expected to boost the growth of the global Encryption Software market.

Some Major TOC Points:1 Report Overview2 Global Growth Trends3 Market Share by Key Players4 Breakdown Data by Type and ApplicationContinued

For Enquiry before buying report @ https://www.orbismarketreports.com/enquiry-before-buying/83040?utm_source=Pooja

About Us : With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us : Hector Costello

Senior Manager Client Engagements

4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.

Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Read more here:
Global Encryption Software Market Expected to reach highest CAGR by 2025: Dell , Eset , Gemalto , IBM , Mcafee - Cole of Duty

Encryption Software Market Future Growth by In Depth Industry Analysis, Size, Trends and Forecast to 2026 – Cole of Duty

Microsoft Corporation

The scope of the Report:

The report analyzes the key opportunities, CAGR, and Y-o-Y growth rates to allow readers to understand all the qualitative and quantitative aspects of the Encryption Software market. A competition analysis is imperative in the Encryption Software market and the competition landscape serves this objective. A wide company overview, financials, recent developments, and long and short-term strategies adopted are par for the course. Various parameters have been taken into account while estimating market size. The revenue generated by the leading industry participants in the sales of Encryption Software across the world has been calculated through primary and secondary research. The Encryption Software Market analysis is provided for the international markets including development trends, competitive landscape analysis, and key regions development status.

By Regions:

* North America (The US, Canada, and Mexico)

* Europe (Germany, France, the UK, and Rest of the World)

* Asia Pacific (China, Japan, India, and Rest of Asia Pacific)

* Latin America (Brazil and Rest of Latin America.)

* Middle East & Africa (Saudi Arabia, the UAE, , South Africa, and Rest of Middle East & Africa)

To get Incredible Discounts on this Premium Report, Click Here @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=COD&utm_medium=005

Highlights of the Encryption Software market study:

Speculations for sales:

The report contains historical revenue and volume that backing information about the market capacity, and it helps to evaluate conjecture numbers for key areas in the Encryption Software market. Additionally, it includes a share of every segment of the Encryption Software market, giving methodical information about types and applications of the market.

Key point summary of the Encryption Software market report:

This report gives a forward-looking prospect of various factors driving or restraining market growth.

It presents an in-depth analysis of changing competition dynamics and puts you ahead of competitors.

It gives a six-year forecast evaluated on the basis of how the market is predicted to grow.

It assists in making informed business decisions by creating a pin-point analysis of market segments and by having complete insights of the Encryption Software market.

This report helps users in comprehending the key product segments and their future.

Strategic Points Covered in TOC:

Chapter 1: Introduction, market driving force product scope, market risk, market overview, and market opportunities of the global Encryption Software market

Chapter 2: Evaluating the leading manufacturers of the global Encryption Software market which consists of its revenue, sales, and price of the products

Chapter 3: Displaying the competitive nature among key manufacturers, with market share, revenue, and sales

Chapter 4: Presenting global Encryption Software market by regions, market share and with revenue and sales for the projected period

Chapter 5, 6, 7, 8 and 9: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions

Finally, the report global Encryption Software market describes Encryption Software industry expansion game plan, the Encryption Software industry knowledge supply, appendix, analysis findings and the conclusion. It includes a through explanation of the cutting-edging technologies and investments being made to upgrade the existing ones.

Report customization:

Verified Market Research also provides customization options to tailor the reports as per client requirements. This report can be personalized to cater to your research needs. Feel free to get in touch with our sales team, who will ensure that you get a report as per your needs.

Get Complete Report @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=COD&utm_medium=005

About us:

Verified Market Research is a leading Global Research and Consulting firm servicing over 5000+ customers. Verified Market Research provides advanced analytical research solutions while offering information enriched research studies. We offer insight into strategic and growth analyses, Data necessary to achieve corporate goals and critical revenue decisions.

Our 250 Analysts and SMEs offer a high level of expertise in data collection and governance use industrial techniques to collect and analyse data on more than 15,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research.

We study 14+ categories from Semiconductor & Electronics, Chemicals, Advanced Materials, Aerospace & Defence, Energy & Power, Healthcare, Pharmaceuticals, Automotive & Transportation, Information & Communication Technology, Software & Services, Information Security, Mining, Minerals & Metals, Building & construction, Agriculture industry and Medical Devices from over 100 countries.

Contact us:

Mr. Edwyne Fernandes

US: +1 (650)-781-4080UK: +44 (203)-411-9686APAC: +91 (902)-863-5784US Toll Free: +1 (800)-7821768

Email: [emailprotected]

View post:
Encryption Software Market Future Growth by In Depth Industry Analysis, Size, Trends and Forecast to 2026 - Cole of Duty

Facebook is jumping on Zoom’s video chat surge with Messenger Rooms, promises it’s "secure and encrypted" – CBS News

Facebook is jumping into the video chat game with Messenger Rooms, a new feature that allows up to 50 people to take part in a video chat, even if they don't have Facebook accounts. The social media giant hopes to tap into the explosive success seen by video communications app Zoom, which has been used by millions all over the world as coronavirus lockdowns have pushed work, school and social lives into the digital sphere.

Zoom, which has seen a meteoric rise in users since the coronavirus pandemic began, has been plagued byreports of hackers disrupting meetings and classes, sometimes shouting racial slurs and displaying pornographic images.

Zoom founder and CEO Eric Yuan said the oversight was in part the result of their lack of preparedness for such a huge influx of new users, and hecalled that a "mistake" during an April 2 appearance on "CBS This Morning." The company said it was taking steps to improve security for its users.

Stan Chudnovsky, head of Facebook Messenger, told CBSN anchors Vladimir Duthiers and Anne-Marie Green that Messenger Rooms would not have such issues when it's rolled out in the U.S., despite a lack of end-to-end encryption.

"We are definitely very secure and encrypted, from the client to the server and from the server to another client," he said.

What that means, he explained, was that the new app is "not accessible by hackers any more than it can be accessed by anybody else when you are using your email" because joining a conference requires the user to be emailed a link.

The way Messenger Rooms is set up, a user emails a link to up to 50 people. If a member does not have an account, they are taken to a browser window where they are prompted to enter their first name before continuing on to the video chat.

The name, Chudnovsky said, is only required so the users can keep track of participants.

He said Facebook was "uniquely positioned" to provide communications services that connect people online, and that video calling has been a part of Facebook's products for years.

Naturally, with Facebook's well-documented history of privacy issues, questions may arise over the privacy of Messenger Rooms users, particularly those without Facebook accounts.

"It actually doesn't give us data that actually we wouldn't have had before," Chudnovsky said. "And we are most definitely not listening or watching anything that's happening over there."

He said the company would not be harvesting any specific information outside of what it is already known to collect in regular operations and Messenger video calls.

"Whatever happens in your living room needs to stay in your living room," he said.

Chudnovsky compared using Messenger Rooms to a "normal video call," with the content of the call staying between the user and whoever they are speaking to.

"That's one of the reasons why we though the name 'Rooms' is perfect, because you're there with your friends and with your loved ones, with people you are close to," he said. "And when you're there, whatever has been said, it's been said between you and the people that you care about and it should stay between you and people you care about."

From that standpoint, Chudnovsky said Facebook has "no access to whatever conversation you're having with your friends."

"And we are not using it in any way, shape or form to help any other parts of the businesses," he said.

See the article here:
Facebook is jumping on Zoom's video chat surge with Messenger Rooms, promises it's "secure and encrypted" - CBS News

Email Encryption Market with Global Innovations, Competitive Analysis, New Business Developments and Top Companies Global Forecast to 2025 – Latest…

The Objective of the Global Email Encryption Market report is to depict the trends and upcoming for the Email Encryption Market industry over the forecast years. Email Encryption Market report data has been gathered from industry specialists/experts. Although the market size of the market is studied and predicted from 2020 to 2025 mulling over 2019 as the base year of the market study. Attentiveness for the market has increased in recent decades due to development and improvement in the innovation.

Top Leading Key Players are:

Micro Focus (UK), Symantech (US), Cisco (US), Trend Micro (Japan), Sophos (UK), Proofpoint (US), BAE Systems (UK), Zix (US),Entrust Datacard (US), Mimecast (UK), Egress Software (UK), Intemedia (US), Virtru (US), Echoworx (Canada), Lux Sci (US), Cryptzone (US).

Get Sample Copy of this Report @ https://www.adroitmarketresearch.com/contacts/request-sample/1054

The Email Encryption Market research report included analysis of various factors that increase market growth. It contains trends, restrictions and drivers that change the market positively or negatively. The Email Encryption Market Report includes all key factors that affect global and regional markets, including drivers, detention, threats, challenges, risk factors, opportunities, and industry trends. This business research paper provides an in-depth assessment of all critical aspects of the global market in relation to Email Encryption market size, market share, market growth factor, main suppliers, sales, value, volume, main regions, industry trends, product demand, capacity, cost structure and Email Encryption market expansion.

The report begins with an overview of the structure of the industry chain and describes the industry environment. Then the size of the market and the Email Encryption forecasts are analyzed by product type, application, end use and region. The report presents the situation of competition on the market between suppliers and the profile of the company. In addition, this report analyzes the market prices and treated the characteristics of the value chain.

Browse the complete report Along with TOC @ https://www.adroitmarketresearch.com/industry-reports/email-encryption-market

Based on application, the Market has been segmented into:

NA

The report provides a thorough assessment of the growth and other aspects of the Email Encryption market in key regions, including the United States, Canada, Italy, Russia, China, Japan, Germany, and the United Kingdom United Kingdom, South Korea, France, Taiwan, Southeast Asia, Mexico, India and Brazil, etc. The main regions covered by the report are North America, Europe, the Asia-Pacific region and Latin America.

The Email Encryption market report was prepared after various factors determining regional growth, such as the economic, environmental, technological, social and political status of the region concerned, were observed and examined. The analysts examined sales, production, and manufacturer data for each region. This section analyzes sales and volume by region for the forecast period from 2020 to 2025. These analyzes help the reader understand the potential value of investments in a particular country / region.

For Any Query on the Email Encryption Market: https://www.adroitmarketresearch.com/contacts/enquiry-before-buying/1054

About Us :

Adroit Market Research is an India-based business analytics and consulting company incorporated in 2018. Our target audience is a wide range of corporations, manufacturing companies, product/technology development institutions and industry associations that require understanding of a Markets size, key trends, participants and future outlook of an industry. We intend to become our clients knowledge partner and provide them with valuable Market insights to help create opportunities that increase their revenues. We follow a code- Explore, Learn and Transform. At our core, we are curious people who love to identify and understand industry patterns, create an insightful study around our findings and churn out money-making roadmaps.

Contact Us :

Ryan JohnsonAccount Manager Global3131 McKinney Ave Ste 600, Dallas,TX75204, U.S.A.Phone No.: USA: +1 972-362 -8199/ +91 9665341414

Read the original:
Email Encryption Market with Global Innovations, Competitive Analysis, New Business Developments and Top Companies Global Forecast to 2025 - Latest...

Fortanix Data Security Platform Now Available on Microsoft Azure to Enhance Private Data Protection in the Public Cloud – Business Wire

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Fortanix Inc., a Runtime Encryption company, today announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud.

Fortanix provides a cloud-native data security solution including key management, hardware security module (HSM), tokenization, secrets management and privacy preserving analytics built on Azure confidential computing infrastructure. Enterprises can provide data security services across on-premises, hybrid and public cloud environments from a single system running on Azure that helps accelerate the migration of private data to public cloud.

The Fortanix Self-Defending KMS helps mutual customers migrate seamlessly from on-premises to cloud, secure their encryption keys, and scale to meet their cloud-scale performance requirements, said Frank Strobel, Director, Cybersecurity and IoT Alliances at F5. Customers running BIG-IP and NGINX solutions in Azure now have an additional choice for key management that preserves scalability while providing full control in securing website traffic.

Today, companies choose to keep sensitive data on-premises, missing out on advantages of scalable cloud processing. In some cases, data security is siloed between separate on-premises and public cloud systems. Fortanix Self-Defending Key Management Service (KMS) provides a cloud-native data security platform with cryptographic services, shared secrets and tokenization across cloud and on-premises environments from a single centralized point of management, control and audit.

Availability

The Fortanix Self-Defending KMS is available immediately in the Azure Marketplace. For more information, see https://azuremarketplace.microsoft.com/en-us/marketplace/apps/fortanix.sdkms-sgx?tab=Overview.

Resources

About Fortanix

Fortanix unlocks the power of organizations most valuable data by securing it throughout its lifecycle, on premises and in the cloud. Fortanix provides unique deterministic security by encrypting applications and data everywhere at rest, in motion, and in use with its Runtime Encryption technology built upon Intel SGX. Fortanix secures F100 customers worldwide and powers IBM Data Shield and Equinix SmartKey HSM-as-a-service. Fortanix is venture backed and headquartered in Mountain View, Calif. For more information, see https://fortanix.com/.

Fortanix and Runtime Encryption are registered trademarks of Fortanix, Inc. Self-Defending Key Management Service is a trademark of Fortanix, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.

Read more here:
Fortanix Data Security Platform Now Available on Microsoft Azure to Enhance Private Data Protection in the Public Cloud - Business Wire

The Global Cloud Encryption Software Market is expected to grow by $ 2.82 bn during 2020-2024 progressing at a CAGR of 38% during the forecast period…

New York, May 04, 2020 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Cloud Encryption Software Market 2020-2024" - https://www.reportlinker.com/p05439314/?utm_source=GNW Our reports on cloud encryption software market provides a holistic analysis, market size and forecast, trends, growth drivers, and challenges, as well as vendor analysis covering around 25 vendors. The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. The market is driven by the increasing use of in-built cloud encryption solutions and growing data privacy and security concerns. In addition, the increasing use of in-built cloud encryption solutions is anticipated to boost the growth of the market as well. The cloud encryption software market analysis includes end-user segment and geographic landscapes

The cloud encryption software market is segmented as below: By End-user BFSI manufacturing professional services healthcare others

By Geographic Landscapes North America Europe APAC South America MEA

This study identifies the data security due to strict regulatory compliance as one of the prime reasons driving the cloud encryption software market growth during the next few years. The analyst presents a detailed picture of the market by the way of study, synthesis, and summation of data from multiple sources by an analysis of key parameters. Our cloud encryption software market covers the following areas: Cloud encryption software market sizing Cloud encryption software market forecast Cloud encryption software market industry analysis

Read the full report: https://www.reportlinker.com/p05439314/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

Originally posted here:
The Global Cloud Encryption Software Market is expected to grow by $ 2.82 bn during 2020-2024 progressing at a CAGR of 38% during the forecast period...