• Securing communications,
    data and devices

LinkedinLinkedin
TwitterTwitter
BlogBlog

White Papers

White Book

Audit Teams Next Generation Collaboration: Data Segregation and Forensic Chain of Custody

Throughout the corporate world, auditors, and especially internal auditors, play a key role in making sure that the whole company both respects rules and is efficient in its day to day operations. In order to perform these tasks, the auditor is required to:

• Gather and analyze evidence, produce reports
• Share these highly confidential documents with executives, other internal teams, and people external to their organization such as regulators
• Meet urgent time constraints

Having a simple and highly efficient collaboration platform that can enable audit teams to share both internally and externally is therefore key to productivity…

Read more

GDPR: Executing data privacy, confidentiality and traceability

The European Union’s General Data Protection Regulation (GDPR) which comes into force in May 2018 has been the topic of many debates over the last year (and is now a source of various concerns) as companies have quickly realized that it could have a major impact on their business processes and solutions in place, as well as a significant business risk if they are not compliant (the much-quoted 4% of worldwide turnover or 20 M€, whichever is the greatest). Had their customers been European citizens, the recent Equifax data breach would have directly impacted their P&L by tens of millions of US Dollars…

Read more

News

Actualité

Meetup DataScience

Davidson SI, ERCOM and SANCARE invite you to a DataScience meetup, organised in Paris, to share with you the feedback of solutions based on the Artificial Intelligence.

Few more available places here

Actualité

Here the ultra secure Smartphone of the French President!

Emmanuel Macron, the French President, communicates with Cryptosmart, the ultra secure solution deployed on Samsung Smartphones.

Source: BFM Business News

Actualité

Ercom launches its public Bug Bounty program

After a first successful private step, the Cryptobox solution is now exposed to attackers in a public bug bounty program ! Click here for more informations.

Press

Ercom, a French leader of secure voice and data communication solutions, announced today the arrival of Romain Waller as Managing Director of the Cybersecurity business to build on the growth momentum in France and abroad   Romain graduated from Ecole Polytechnique and Ecole des Mines de Paris, and held several management positions with Sagem, Technicolor … Continue reading Romain Waller joined the Ercom management team as Managing Director of the Cybersecurity BU

D&A’S HOLISTIC IG SERVICE PICKS CRYPTOBOX AS ITS SECURITY STANDARD NY, New York: Davis & Associates (D&A), a leading provider of integrated technology solutions and information governance services for law firms, corporate legal and IT departments is pleased to announce that Ercom and D&A have formed a partnership to leverage Ercom Cryptobox’s secured file sharing … Continue reading Davis & Associates, LLC Incorporates Cryptobox file security solution

Paris, France – September 26, 2017 A managed service offer for businesses and the public sector A mobile application to easily secure voice, video, instant messaging and file transfers Increased privacy with end-to-end encryption of mobile communications Orange Cyberdefense launches “Mobile Security Intense”, an offer to secure mobile communications for businesses and the public sector. … Continue reading Orange Cyberdefense widens access to professional communications security with its “Mobile Security Intense” offer

Bussy Saint Georges – France, July 11, 2017 Ercom, a reference solution provider for secure voice and data communications, and Tech Data, a provider of value-added solutions for businesses, are pleased to announce a partnership to distribute Ercom security solutions. Tech Data, through its Azlan division, specialized in marketing value-added IT products, solutions and services … Continue reading Tech Data distributes Ercom cybersecurity solutions

Wednesday, May 10, 2017 Ingram Micro France announces the distribution of the solution portfolio of Ercom, the French company specialized in securing communications, devices and data. Starting now, Ingram Micro offers Cryptosmart, a solution for securing mobile devices and communications, as well as Cryptobox, a solution for secure collaboration and sharing. These two solutions are … Continue reading Ingram Micro distributes Ercom solutions

UPCOMING EVENTS

Hexatrust Summer School
From 05.09.2017 To 05.09.2017
Paris 16, Paris, France

Ercom will be at the Hexatrust Summer School at the Pavillon Royal in Paris the 5th Septembre 2017.

Mobile World Congress America 2017
From 12.09.2017 To 14.09.2017
San Francisco, Californie, États-Unis

Visit us on the OT-Morpho booth and discover our joint Cryptosmart SIM-POWERED solution.

Securtiy Leader Summit
From 26.09.2017 To 26.09.2017
New York, État de New York, États-Unis

Ercom will present Cryptobox at the Security Leader Summit the 26th September in New York.

NEACS 2017
From 17.10.2017 To 17.10.2017
Trumbull Marriott Merritt Parkway, Hawley Lane, Trumbull, Connecticut, États-Unis

Ercom will present Cryptobox at the Cybersecurity Summit the 17 October in Trumbull 2017.

NIAS 2017
From 17.10.2017 To 19.10.2017
MONS Expo, Mons, Belgique

Ercom will present at the NIAS exhibition its certified solutions of Cybersecurity.

FIC 2018
From 23.01.2018 To 24.01.2018
Lille, France

Ercom will present during FIC 2018 its Cybersecurity solutions : Cryptobox, Cryptosmart, Cryptopass.

Legal Tech New York
From 30.01.2018 To 01.02.2018
New York Hilton Midtown, 6th Avenue, New York, État de New York, États-Unis

We will be attending the Legal Tech event in New York City to present Cryptobox.

Orange Cyberdefense Live#2018
From 05.02.2018 To 05.02.2018
75007 Paris, France

Ercom participates to the Orange Cyberdefense live#2018 event to highlight his partnership with Orange

Secure IT Day
From 08.02.2018 To 08.02.2018
75019 Paris, France

Participate to technical workshops of Systems Security leaders. You will discover latest technologies and exchange with the experts.

Mobile World Congress 2018
From 26.02.2018 To 01.03.2018
Barcelone, Espagne

Visit our experts in Cybersecurity on our booth located in the Business France Pavillon, Hall 5 and discover our solutions of secured communications.

Roomn 2018
From 06.03.2018 To 08.03.2018

Ercom will participate at Roomn to present its solutions of secured mobile communications.

Assises de la Sécurité
From 10.10.2018 To 13.10.2018
Monaco

Meet us on the Assises to discuss about your projects of secure communications and data!

The blog

Last articles

Fighting fraud: From Big Data to Fast Data

Credit card fraud is the most visible type of consumer fraud: According to The Nilson Report, global damages caused by credit card fraud reached 21 billion dollars (18.4 billion euros) in 2015. Less known to consumers, wire transfer fraud (see https://blog.ercom.fr/social-engineering-and-its-consequences/) catches the attention of banks seeking to protect their customers, as one single such attack may siphon … Continue reading Fighting fraud: From Big Data to Fast Data

Continue reading

Social engineering and its consequences

While the media highlight increasingly sophisticated cyber-attacks, decision-makers could easily forget that humans are one of the main weak links of IT security. According to the latest IBM – Ponemon Institute report published in 2016, 25% of data leaks are due to human error or negligence. Social engineering is about exploiting human weakness to obtain … Continue reading Social engineering and its consequences

Continue reading

Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

February 28, 2017  |  By Rick Robinson from Security Intelligence Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data that’s placed in the cloud. The trend of adopting public cloud solutions continues to grow, but protecting critical data in … Continue reading Article from Security Intelligence : How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

Continue reading