Press Release, News
ShareVault, the leader in secure document sharing for enterprise applications, and NetAuthority, Inc., the leader in strong authentication solutions for trusted Internet-connected devices and transactions, announced today a customer and partner agreement for ShareVault to offer NetAuthority's advanced access control and identify verification capabilities to ShareVault's enterprise customers and partners.
ShareVault enables corporations to maintain control of and protect critical information shared among internal users and third parties outside the corporate domain. Used to securely share documents and track their access, ShareVault reduces information leakage risk while enabling collaboration among internal and external groups with support for Windows, Macintosh and iPad devices. ShareVault is used for applications in the financial services, bioPharma life sciences, legal services, energy/natural resources and other industries for mergers and acquisitions, fund raising, distressed asset sales, litigation support, corporate compliance, partnering applications.
In addition, with its ShareVault for SharePoint offering, corporations can also create a separate environment to securely share selected information from multiple SharePoint sites with external parties. ShareVault integration with SharePoint requires no software modifications to SharePoint while allowing an independent layer of user permissions and real time tracking and audit trail reporting.
NetAuthority's capabilities will enhance ShareVault's advanced and proprietary security architecture and features for document sharing by adding powerful, patented device identification and authentication capabilities that irrefutably prove the identify of a device connecting to a ShareVault secure document sharing service. With NetAuthority's solution in place, devices, in addition to the users themselves, must prove their identity before accessing critical corporate data stored, managed, and shared from within ShareVault. With the end-to-end integrated solution, the device will be required to authenticate itself using a device key generated by NetAuthority that cannot be spoofed and can irrefutably identify and authenticate the device based on key characteristics, all of which is invisible to the user and does not require any manual interaction. The system prevents security breaches as well as provides zero-day protection against automated man-in-the-middle and man-in-the-browser attacks through irrefutable transaction verification.