Story image

VeilMail: No leaks. No trail. No fail?

26 Aug 2014

Turner Technologies has vowed to provide “military strength” security protection across company communications, by introducing VeilMail to the market.

Branded as “No leaks. No trail. No fail”, Turner Technologies CEO Greg Roake says VeilMail is as “sophisticated and secure as electronic messaging can get.”

“Why VeilMail? Quite simply because conventional email isn’t secure,” he says. “Too many organisations have learnt the hard way that the cyber world is not secure.

Six years in the development, Roake says VeilMail works in a “completely different manner” to other supposedly secure electronic services.

Ensuring business communications go directly to the intended recipient, Roake says VeilMail can guarantee private messages do not go via traditional email servers.

Alluding to the common trail of sender to ISP provider to recipient, Roake says the solution effectively cuts out the middleman, an offering which continues to gain relevance as electronic spying and hacking becomes increasingly sophisticated.

“Companies dealing with confidential information need to be more vigilant,” Roake adds.

“Even if your IT infrastructure is secure, how can you be sure of the integrity of the recipient’s IT infrastructure? Or lack of it.”

But isn’t encrypted email secure?

“No,” claims Roake. “Someone other than the sender and recipient also holds the key, allowing the email to be decrypted along the way.

“Gone are email addresses and local storage, in are your own personally managed ISP, encryption in message transfer and for all information stored, as well as auto decryption.”

Roake says VeilMail offers “total control of correspondence”, subsequently providing a closed loop electronic communication which helps ensure no transmission trail or fail.

Available also from mobile devices, Roake believes all sectors of business that expect and need total privacy for their communication can benefit from the solution.

This includes enterprise level companies, high level corporates, government and banking institutions among others.

“We believe organisations should be able to conduct their business safe from hackers, spam and viruses,” adds Roake.

“We operate with the highest levels of integrity and aim to work with organisations operating under the same strict business ethics.

“Our goal is to allow business and government to keep their commercially sensitive information safe from prying eyes - and so enabling the building of successful, global organisations.”

For more information about VeilMail click here

Dropbox invests in hosting data inside Australia
Global collaboration platform Dropbox has announced it will now host Australian customer files onshore to support its growing base in the country.
Opinion: Meeting the edge computing challenge
Scale Computing's Alan Conboy discusses the importance of edge computing and the imminent challenges that lie ahead.
Alibaba Cloud discusses past and unveils ‘strategic upgrade’
Alibaba Group's Jeff Zhang spoke about the company’s aim to develop into a more technologically inclusive platform.
Protecting data centres from fire – your options
Chubb's Pierre Thorne discusses the countless potential implications of a data centre outage, and how to avoid them.
Opinion: How SD-WAN changes the game for 5G networks
5G/SD-WAN mobile edge computing and network slicing will enable and drive innovative NFV services, according to Kelly Ahuja, CEO, Versa Networks
TYAN unveils new inference-optimised GPU platforms with NVIDIA T4 accelerators
“TYAN servers with NVIDIA T4 GPUs are designed to excel at all accelerated workloads, including machine learning, deep learning, and virtual desktops.”
AMD delivers data center grunt for Google's new game streaming platform
'By combining our gaming DNA and data center technology leadership with a long-standing commitment to open platforms, AMD provides unique technologies and expertise to enable world-class cloud gaming experiences."
Inspur announces AI edge computing server with NVIDIA GPUs
“The dynamic nature and rapid expansion of AI workloads require an adaptive and optimised set of hardware, software and services for developers to utilise as they build their own solutions."