+
  • Securing communications,
    data and devices

LinkedinLinkedin
TwitterTwitter
BlogBlog

White Paper

White Book
Audit Teams Next Generation Collaboration: Data Segregation and Forensic Chain of Custody

Throughout the corporate world, auditors, and especially internal auditors, play a key role in making sure that the whole company both respects rules and is efficient in its day to day operations. In order to perform these tasks, the auditor is required to:

• Gather and analyze evidence, produce reports
• Share these highly confidential documents with executives, other internal teams, and people external to their organization such as regulators
• Meet urgent time constraints

Having a simple and highly efficient collaboration platform that can enable audit teams to share both internally and externally is therefore key to productivity…

Read more

GDPR: Executing data privacy, confidentiality and traceability

The European Union’s General Data Protection Regulation (GDPR) which comes into force in May 2018 has been the topic of many debates over the last year (and is now a source of various concerns) as companies have quickly realized that it could have a major impact on their business processes and solutions in place, as well as a significant business risk if they are not compliant (the much-quoted 4% of worldwide turnover or 20 M€, whichever is the greatest). Had their customers been European citizens, the recent Equifax data breach would have directly impacted their P&L by tens of millions of US Dollars…

Read more

News

Actualité

Here the ultra secure Smartphone of the French President!

Emmanuel Macron, the French President, communicates with Cryptosmart, the ultra secure solution deployed on Samsung Smartphones.

Sources: BFM Business 1 et BFM Business 2

Actualité

Ercom launches its public Bug Bounty program

After a first successful private step, the Cryptobox solution is now exposed to attackers in a public bug bounty program ! Click here for more informations.

Press

Ercom completes its Board of Advisors with Chris Burke who will bring a wide range of expertise in scaling up mid-size companies and driving international development. Chris Burke has forged his career in the telecommunications, IT and technology spanning more than 30 years in both Europe and North America. He has held technical and management … Continue reading Chris Burke joins Ercom as Senior Advisor to support its international expansion

With this partnership, Ercom and Abbakan address the growing demand of ever more mobile and connected employees for security solutions Ercom, the leading French vendor in its field, has been offering its telecom and cryptographic expertise to customers for more than 30 years. The company invests heavily in R&D in order to develop and deliver solutions … Continue reading Ercom and Abbakan Announce a Distribution Partnership in France

Ercom, a French leader of secure voice and data communication solutions, announced today the arrival of Romain Waller as Managing Director of the Cybersecurity business to build on the growth momentum in France and abroad   Romain graduated from Ecole Polytechnique and Ecole des Mines de Paris, and held several management positions with Sagem, Technicolor … Continue reading Romain Waller joined the Ercom management team as Managing Director of the Cybersecurity BU

D&A’S HOLISTIC IG SERVICE PICKS CRYPTOBOX AS ITS SECURITY STANDARD NY, New York: Davis & Associates (D&A), a leading provider of integrated technology solutions and information governance services for law firms, corporate legal and IT departments is pleased to announce that Ercom and D&A have formed a partnership to leverage Ercom Cryptobox’s secured file sharing … Continue reading Davis & Associates, LLC Incorporates Cryptobox file security solution

Paris, France – September 26, 2017 A managed service offer for businesses and the public sector A mobile application to easily secure voice, video, instant messaging and file transfers Increased privacy with end-to-end encryption of mobile communications Orange Cyberdefense launches “Mobile Security Intense”, an offer to secure mobile communications for businesses and the public sector. … Continue reading Orange Cyberdefense widens access to professional communications security with its “Mobile Security Intense” offer

UPCOMING EVENTS

Upcoming events

< >

Securtiy Leader Summit

From 26.09.2017 To 26.09.2017
New York, État de New York, États-Unis

Ercom will present Cryptobox at the Security Leader Summit the 26th September in New York.

Assises de la Sécurité

From 11.10.2017 To 14.10.2017
Monaco

Meet Ercom experts at Assises in the Hexatrust Pavilion

Orange Cyberdefense Live#2018

From 05.02.2018 To 05.02.2018
75007 Paris, France

Ercom participates to the Orange Cyberdefense live#2018 event to highlight his partnership with Orange

The blog

Last articles

Fraud and interpretability of machine learning models

Interpretability: the missing link in Machine Learning adoption for fraud detection Machine learning methods are increasingly used, especially in anti-fraud products (developed by Ercom Analytics and other vendors) to capture weak signals and spot patterns in data that humans would otherwise miss. If the relevance of these methods for fraud detection is widely recognized, they … Continue reading Fraud and interpretability of machine learning models

Continue reading

Fighting fraud: From Big Data to Fast Data

Credit card fraud is the most visible type of consumer fraud: According to The Nilson Report, global damages caused by credit card fraud reached 21 billion dollars (18.4 billion euros) in 2015. Less known to consumers, wire transfer fraud (see https://blog.ercom.fr/social-engineering-and-its-consequences/) catches the attention of banks seeking to protect their customers, as one single such attack may siphon … Continue reading Fighting fraud: From Big Data to Fast Data

Continue reading

Social engineering and its consequences

While the media highlight increasingly sophisticated cyber-attacks, decision-makers could easily forget that humans are one of the main weak links of IT security. According to the latest IBM – Ponemon Institute report published in 2016, 25% of data leaks are due to human error or negligence. Social engineering is about exploiting human weakness to obtain … Continue reading Social engineering and its consequences

Continue reading