/
Research: out of band communication

Research: out of band communication

75% draft

PURPOSE

This document defines the reasoning for and capabilities of out-of-band communication. The purpose of this document is to educate the reader on the value proposition of out-of-band communication and analyze potential competitive offerings for Mattermost within the marketplace.

HISTORY

  • February 8, 2024: Document migrated to Fast Futures Confluence.

  • October 27, 2023: Document reorganized with a new table of contents; added feature roadmap and competitor matrix.

  • October 17, 2023: Document created; MVP drafted.

OVERVIEW

Out-of-band communication takes place outside of a company’s primary corporate network, allowing employees to communicate and collaborate securely even when the primary network becomes unavailable or compromised. It exists independently and is not connected to daily communication systems. Out-of-band communication supports an organization’s business continuity plan. This form of communication prioritizes security and should be relatively easy for staff to access, learn, and utilize. Common forms of out-of-band communications include:

  • Private and public text channels, including audio, video, and screenshare;

  • Non-company email accounts;

  • File-sharing tools;

  • One-way alerting and messaging to all employees.

To bolster security, many out-of-band communication channels incorporate multi-factor authentication (MFA) and end-to-end encryption (E2EE). Even the modes of authentication (e.g., everyday SSO like Okta) and encryption for out-of-band communication must exist outside of the primary corporate network.

KEY INSIGHTS

  • Out-of-band communication is a contingent tool designated for mission-critical and/or highly-sensitive conversations, especially during mission-critical incidents.

  • Out-of-band communication plays a pivotal role in incident response and collaboration.

  • Out-of-band communication must be secure, compliant with regulations, and focused on the task at hand.

  • Out-of-band communication should avoid relying on standard infrastructure, authentication, and encryption.

  • Out-of-band communication includes email, voice, real-time communications, mass one-way communications for all personnel, and file storage.

  • Organizations must ensure that their out-of-band communication adheres to internal legal protocols.

  • It is imperative to establish and test your out-of-band communication systems before an incident materializes. Moreover, regular (annual at minimum) testing of OOB is recommended to guarantee its optimal performance.

  • Out-of-band communication should work and be available at all times.

TERMINOLOGY

  • Out-of-band communication: A communication method that operates independently of the primary or regular communication channels, used for mission-critical and/or highly-sensitive communication between key stakeholders, and/or by personnel during emergencies.

  • Corporate network: The digital infrastructure that facilitates internal and external communication within a company.

  • MFA (multi-factor authentication): A security process where users provide multiple verification methods to confirm their identity.

  • E2EE (end-to-end encryption): A form of encryption ensuring that data transmitted between two parties cannot be deciphered by any intermediate system.

  • Incident response and collaboration: The process of multiple teams working together to manage, respond, and recover from a significant unplanned event or disruption.

  • Business continuity plan: The systematic process and set of protocols developed by an organization to anticipate, prepare for, respond to, and recover from potential threats or disruptions to its operations.

HOW DOES IT WORK?

Preparation is the key to an effective out-of-band communication system. Organizations should conduct regular drills, ensuring that stakeholders are well-versed with the communication channels, their usage, and their efficiency. While it's not necessary to have every employee set up for out-of-band communication, a system for emergency, one-way communication is beneficial (at a minimum). Only personnel that are pivotal to the organization's incident response and recovery should have full access to the system.

Out-of-band communication should be perceived as a provisional setup, employed while restoring the primary communication systems and verifying their security integrity. However, certain mission-critical and/or highly-sensitive communication may potentially only exist in out-of-band communication systems, to prevent your incident response workflows from being anticipated and counteracted in the event of a compromise. In a major cyber attack, normal means of communication should be assumed compromised.

How does an organization coordinate a breach response if it can’t trust its own communications? That’s the role out-of-band communication plays in a business continuity plan. The absence of proactive resilience, especially during massive infrastructure failures or security breaches, can lead to costly downtime.

An organization should review and update its business continuity plan on a regular basis. Evaluating helps uncover shortcomings, allowing organizations to consider factors such as:

  • Mistakes: In high-tension situations, the likelihood of mistakes rises due to the intense pressure. It's crucial to ensure that the crisis management team can handle stress and isn't navigating the plan for the first time during an actual crisis.

  • Volume: A barrage of email alerts can be daunting, leading employees to disregard crucial crisis notifications. It's imperative for organizations to communicate effectively, ensuring messages reach the intended recipients promptly and through a secure mode they'll notice.

  • Timing: In crisis situations, every moment is crucial, and delays due to manual interventions can be detrimental. Implementing digital solutions for crisis responses, grounded in set protocols and critical event management tools, can bolster organizational resilience.

  • Remote: The shift to remote work means teams are often spread out, which can heighten the risk of missteps during crisis response when team members aren't co-located.

Key Features

Feature

Pros

Cons

Questions

Stand-alone user provisioning, access control, & authentication

A requirement of OOB is to have a separate source of identity, this allows us to prescribe that spec

 

Can we integrate with Microsoft Entra

 

Could we use IAM or something like Descope? Identity federation for all your apps | Descope  

 

Descope Launches Identity Federation Broker  

Integrated compliance and e-discovery capabilities

 

 

 

E2E encryption and decentralized key management

 

 

 

Controlled file sharing

 

 

 

Secure data management and monitoring

 

 

 

Federation and shared channels, bridges to other apps

Potentially part of SBIR roadmap already

 

 

One-way message broadcasting

 

 

 

Message “burn” / self-destructing messages

Useful to transmit highly secure, one-time information during incidents

Works counter to eDiscovery and compliance tools

 

CONVERSION TO PAID

Trigger

Pros

Cons

Questions

Need more users

 

 

 

Need longer data retention

 

 

 

Need higher file size limits

 

 

 

Need enterprise-level support

 

 

 

Need eDiscovery capabilities

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

COMPETITOR MATRIX

Competitor

Description/pitch

Primary relevant features

Freemium offering

Conversion to paid

AWS Wickr

“Protecting communications with end-to-end encryption

Secure collaboration across messaging, calling, file sharing, and screen sharing.”

Closed source

 

Secure

Industry Leading End-to-End Encryption

 

Zero Trust Platform Design

Advanced Security Features

 

Compliant

Manageable Security and Administrative Controls

 

Automatic Enforcement of Data Retention Policies

 

Centralized Message Archiving Capability

 

1:1 and Group Messaging, Teleconference and File Sharing

Enterprise Integrations (SSO, MDM, etc.) and Bots

 

Federated SaaS and On-Premise Deployment Options

AWS Wickr Pricing | Secure Collaboration Solution  

 

Up to 30 users.

1:1, group chats, and rooms

Data expiration timer of up to 30 days

Maximum 1 GB file attachment

Limited storage

Voice and video calls up to 100 people

Secure screen sharing

Extensible workflows

Federated users

For small and large business teams that need administrative controls and flexibility.

 

For businesses that require highest feature limits, granular administrative controls, and immediately available data retention.

 

The only secure enterprise workspace with multiple deployment options, fine grain controls, policy, and data retention solutions right out of the box.

 

Unlimited users

Data expiration timer of up to 1 year

Maximum 5 GB file attachment

Self hosted within customer environment

24/7 SLA

Pre-configured security groups

Data retention and eDiscovery capabilities***

 

ERCOM Citadel Teams

“For over 30 years, Ercom has developed a leadership position in the communications, data and terminal security markets.

This position is based on complementary technological expertise in telecom/cloud infrastructure, cryptography and software and on shared values: innovation, expertise, commitment and confidentiality.

 

Thanks to its ability to adapt and its SaaS strategy, Ercom is able to meet the needs of both large companies and SMEs with certified security solutions that comply with the highest functional requirements.”

Closed source

 

Chat and file sharing

Send messages and share files without limit up to 200MB per file!

 

End-to-end encryption

To be activated when necessary: all your messages, documents, multimedia files and calls are encrypted.

 

 

Encrypted calls

With encrypted HD telephony functionality, make calls securely from anywhere.

 

Operated by Thales, hosted in France

The service is developed by Thales security teams and hosted on Thales and OVH infrastructures.

 

 

Administration console

Access the complete list of your users (enable or disable an option, deactivate an account, disconnect a terminal etc.)

(information not available on their website)

(information not available on their website)

Element/Matrix

“Element is led by the creators of Matrix, the decentralized open standard for secure and sovereign real time communication.”

E2EE

Protocol vs. platform

Open source

 

Secure and compliant.

Protect and strengthen business critical communications.

 

Control your data.

Open source and flexible hosting to enable data sovereignty.

 

Connect with partners.

Trusted communication in real-time across organizations.

 

Communicate and collaborate with people and organizations you trust.

 

Choice.

Choose how you host, share and manage your data.

 

Freedom.

Freedom to structure discussion spaces and customize chat rooms.

 

In real time, all the time.

Instant messaging, voice/video calls, location sharing, voting polls and much more...

 

Boost collaboration.

Share live data through widgets and integrations to supercharge your productivity.

 

Secure by default.

Our technology protects your data while you focus on getting your work done.

 

Admin console.

Provides a streamlined way to manage your network configurations and permissions.

 

Identity management.

ID management and access control using SSO and ACLs.

 

Bridges.

Connect to internal and external partners based on siloed communication apps.

 

Complete independence.

Own and control your entire communication platform.

 

Powerful federation.

Configure networks to suit organizational requirements.

 

Reduce risks.

Strengthen cybersecurity and business continuity plans.

Free up to 200 users

Features include:

 

End-to-end encryption by default

 

Instant messaging and video calls

 

Admin controls

 

Enterprise.

Advanced controls

$10 per user/month (paid annually)

Business features, plus:

 

Self-hosted or fully managed

 

Auditing & reporting for compliance

 

Custom DNS

 

Group Sync for access control

Self-hosted

 

 

 

 

 

Sovereign.

Custom deployments

Priced per deployment

Enterprise features, plus:

 

Nationwide scalability

 

Antivirus / Content scanner

 

Custom mobile push gateway

 

Dedicated identity server

 

Branded mobile app (min 5K users)

 

Rocket.chat

“The collaboration platform for organizations that handle sensitive business or customer data.”

E2EE

Federates over Matrix protocol

Open source

 

Built for teams that need more control

 

100% in Control

Own your conversations. Choose from self-hosted, air-gapped or secure cloud deployment options that meet your security and compliance needs.

 

100% Privacy

E2E encrypted, ISO 27001 certified, and supporting compliance with GDPR, CCPA, LGPD, and HIPAA.

 

100% Customizable

Integrate with your ecosystem using our open API. Enjoy a wide range of customization and white-labeling options. Perfect as in-app or livestream chat.l

Community

The basics to get small teams started.

Deploy and host the free version of Rocket.Chat on your own server.

$0

/user/month

Deploy now

Includes:

 

Team collaboration

Unlimited 1:1 and group messaging

Basic user sync

OAuth basic social logins

Two-factor authentication

End-to-end encryption

Full messaging history

1:1 federated messaging

Distribute inquiries across available agents

Analytics and real-time monitoring

Livechat

Email (basic)

SMS (basic)

Scalability

Up to 10,000 push notifications per month

Up to 5 active marketplace apps

Up to 3 private apps

Presence service for up to 200 concurrent users

Support

Peer-to-peer community assistance

Deployment options

Self-managed

Enterprise

The highest level of security, regulatory compliance, performance and scalability.

Pricing based on number of team collaboration users & omnichannel agents. Volume discounts may apply.

$7

/user/month

Minimum of 25 users

or

$35

/agent/month

Minimum of 5 agents

 

Team collaboration

Unlimited & secure push notifications

Full Matrix Federation

Advanced identity management

Centralized admin controls

Auditing capabilities and granular audit logs

Data loss prevention

Video conferencing integrations

Custom roles and permissions

Guest users

Custom white-label branding

Delivered/read receipt

 

Omnichannel customer collaboration

Templated messages for common messages

Route returning customers to previous agent

High impact inquiry prioritization

Queue waiting time display

Mobile app for agents

Inquiry forwarding across teams and departments

Multiple queues & departments

Conversation priority indicators

Expanded transcript exports

 

Channels

Facebook Messenger

WhatsApp Business

Instagram Direct

Twitter

Telegram

Email (premium, coming soon)

SMS (premium, coming soon)

VoIP

 

Scalability

Unlimited & secure push notifications

Unlimited marketplace apps

Unlimited private apps

Uncapped presence service

Microservices scaling

Multiple instance scaling

 

Support

Web support portal

 

Deployment options

Choice of self-managed or secure cloud

Standard Cloud hosting plan

  • OVH hosted in default regions

  • Shared infrastructure

  • Limited Cloud Support (see Terms of Service)

  • Volume limits (see Terms of Service)

  • 500 max users

  • Default API rate limiter

  • 50Gb storage

  • 5K omnichannel conversations/month

WhatsApp/SMS

“Simple, reliable, private messaging and calling for free, available all over the world.”

Commonplace (everyone has it, probably)

Consumer app (not designed for enterprise)

End user service

No professional plans

Signal

“Share Without Insecurity

State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can't read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time.”

E2EE

Consumer app (not designed for enterprise)

Fully free, intended for end users (not business)

No professional plans

Telegram

“Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.”

E2EE

 

Simple

Telegram is so simple you already know how to use it.

 

Private

Telegram messages are heavily encrypted and can self-destruct.

 

Synced

Telegram lets you access your chats from multiple devices.

 

Fast

Telegram delivers messages faster than any other application.

 

Powerful

Telegram has no limits on the size of your media and chats.

 

Open

Telegram has an open API and source code free for everyone.

 

Secure

Telegram keeps your messages safe from hacker attacks.

 

Social

Telegram groups can hold up to 200,000 members.

 

Expressive

Telegram lets you completely customize your messenger.

 

Fully free, intended for end users (not business)

Premium for end users:

 

Premium Telegram Premium

By subscribing to Telegram Premium, users unlock doubled limits, 4 GB file uploads, faster downloads, exclusive stickers and reactions, improved chat management – and a whole lot more.

 

At the same time, all existing features that users have come to expect and rely on for nearly a decade remain free. Moreover, non-premium users will be able to enjoy some of Premium's benefits: for example, download the extra-large documents and view stickers sent by premium users, as well as tap to increase counters on premium reactions that were already added to a message.

 

The contributions of premium subscribers will help improve and expand the app for decades to come, while Telegram will remain free, independent and uphold its users-first values, redefining how a tech company should operate.

 

Everbridge

“Everbridge 360™ empowers organizations to anticipate, mitigate, respond to, and recover stronger from critical events. Our unified platform digitizes organizational resilience by combining intelligent automation with the industry’s most comprehensive risk data to Keep People Safe and Organizations Running™.”

Critical Event Management (CME)

 

Everbridge 360™ represents our relentless dedication to provide our customers with the most comprehensive and unified interface to manage critical events across one single platform so you can know earlier, respond faster, and improve continuously.

 

More effectively manage critical events, minimize communication delays, and improve overall organizational resilience through the industry’s most advanced and unified dashboard.

 

 

Splunk Phantom

“Phantom’s flexible app model supports hundreds of tools and thousands of unique APIs, enabling you to connect and coordinate complex workflows across your team and tools. Powerful abstraction allows you to focus on what you want to accomplish, while the platform translates that into tool-specific actions. Phantom enables you to work smarter by executing a series of actions — from detonating files to quarantining devices.”

Splunk Phantom is a Security Orchestration, Automation, and Response (SOAR) system. The Splunk Phantom platform combines security infrastructure orchestration, playbook automation, and case management capabilities to integrate your team, processes, and tools to help you orchestrate security workflows, automate repetitive security tasks, and quickly respond to threats.

 

 

Armour Comms

“Secure communications for everyday devices”

Armour Mobile/Desktop

Our flagship product, Armour Mobile provides all the functionality of consumer-grade apps but with considerably greater security. It provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments, sent/ received/read message status and the option for messages to automatically delete once read or after a set time (MessageBurn).

 

Most importantly we protect not only the content of communications, but also the associated meta-data. This means no-one even knows you are having a conversation, let alone what that conversation is about. Armour Mobile prevents mobile communications whether voice, text, video or conference from being intercepted by devices such as IMSI catchers, or hacks using the SS7 protocol and others. It enables secure collaboration between trusted colleagues when discussing commercially sensitive information such as corporate intellectual property, financial transactions, and customer details.

 

With Armour Desktop, which works with a Windows 10 softphone, and integration with Unified Comms, organisations are able to take advantage of the reduced costs and increased flexibility provided by Voice over IP.

 

 

SigNet by Armour

SigNet by Armour is an alternative to our flagship product Armour Mobile, developed to suit specific security and operational requirements. SigNet provides secure voice, video, messaging, group chat, file attachments and Message Burn (timed messages) with AES-256 bit encryption, with an on-premises option for total privacy and no auditability. SigNet provides the same ease of use as consumer grade apps and is available for Android and iOS devices and for Windows 10 and Mac OSX desktops. This new product line will run concurrently with Armour Mobile.

 

SigNet uses a peer-to-peer key management system, specifically  a double ratchet algorithm with pre-keys and 3-DH key management to provide confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, future/backward secrecy, causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity.

No free tier

More like a consultant/whitelabel/partner with an internal service/deployment stack they’ve developed

ArmorText

“Secure Out of Band Collaboration

Securing Your Most Critical Roles and Operations”

ArmorText Features

ArmorText was built to secure your your most critical roles and operations​. 

 

End-to-End Encryption

What sets ArmorText apart is our unique User+Device and Scope-of-Review specific E2EE approach.

 

Data Sovereignty

Meets sovereignty requirements without forcing you to self-host or operate multiple instances across geographies.

 

E-Discovery

End-to-end encrypted retained archives, in-console review, and native support for RSMF & JSON exports for e-discovery.

 

100% In the Cloud

Out-of-Band means never relying on on-premise or in-network infrastructure. ArmorText works even when everything else is down.

 

 

1:1 & Group Collaboration

Messaging, file sharing, voice, video, and screen sharing.

 

Enterprise Controls

Policy enforcement, user management, and federated Trust Relationships.

 

Secure Onboarding

Day-to-day and in-crisis onboarding approaches for maximum security.

 

Reserve Capacity

For when business continuity requires moving operational communications out-of-band.

 

Trusted Integrations

End-to-end encrypted integrations via the ArmorText Secure Gateway.

 

 

Teamwire

“Secure instant messaging for business

All in one app - chat, video conferencing & much more

100% GDPR compliant & police security standards”

Intuitive messaging

 

Everything you are used to from private messaging

 

Group chats

Voice messaging

Photo, video, and file sharing

Voice and video calls

Our messaging features

 

Effective collaboration

 

All features for better collaboration

 

Video conferencing

Broadcasting & distribution lists

Status messages

Alerts for emergencies

Push-to-Talk Interface

Live location features

Our teamwork features

 

Maximum security

 

Data protection & data security at the highest level

 

100% GDPR compliant

Absolute data sovereignty

Complete encryption of all data

“Zero Trust” security concept

German cloud or on-premise hosting

Fail-safe infrastructure

Security with Teamwire

 

Central administration

 

Easy administration – ideal for medium and large enterprises

 

User and device management

Connection to Active Directory

More than 50 security and compliance policies

Controllable app container

Compatible with MDM and UEM solutions

Audit-proof archiving & audit logs

No free tier

Starter

 

For small businesses, for which basic features for messaging and sharing are sufficient

€1.75

user/month*

For small businesses, for which basic features for messaging and sharing are sufficient

Try for Free

License conditions:

Maximum devices per user: 1

German cloud

Standard

 

For organizations, that want to cover all relevant use cases from messaging to video conferences

€3.45

user/month*

For organizations, that want to cover all relevant use cases from messaging to video conferences

Contact Sales

License conditions:

Maximum devices per user: 3

German cloud

Professional

 

For larger enterprises, who require advanced administration and comprehensive integrations

Price on request

Contact Sales

License conditions:

Maximum devices per user: 5

German cloud, private cloud or 
on-premise hosting

 

Stashcat

“The Perfect Features in Your Business Messenger

You want uncompromising security for your business communication, in combination with the best possibilities of modern messaging? stashcat is the messenger you can use to professionalize your communication: With true End-to-End Encryption, you use a GDPR compliant communication tool “Made in Germany”, which is developed with businesses for businesses.

 

 

 

Get a comprehensive overview of the Features such as Chat, File Storage, Voice and Video Calls, Video Conferencing and much more, and see how easy the usage is for users and administrators.”

Multipurpose, safe and easy to use

Overview of the most helpful Features

 

Messenger Features and Chat

Chat with all your colleagues in individual and group conversations or in #Channels - just as you like. Or keep...

About Messenger features ➔

 

File Storage and Management

Your files are now available to you anywhere and on any device - thanks to the secure stashcat cloud. Share...

Learn more about the cloud ➔

 

Voice and Video Calls, Video Conferencing

Call your colleagues with one click: Via end-to-end encrypted voice or video call directly in stashcat, or video conferencing for...

More than just instant messaging ➔

 

Team Work: Collaboration Tools

Work together with stashcat: Appointments and coordination can be done easily with the integrated calendar and survey module. Guest accounts...

Connect them all ➔

 

Privacy and Push Notifications

stashcat offers privacy settings for status, location, read receipts and call blocking. Incoming messages are signaled to users via push...

Your messenger, the way you need it ➔

 

Organization Management and Administration

stashcat already provides business communication to many customers, even with their own branding, on your organization's servers. Make individual settings,...

Administrate and communicate easily ➔

 

Safety Features

Delete your content automatically after a desired period of time or protect it additionally by masking the content. If mobile...

It's that safe the police use it, too ➔

 

Contacts and Contact Management

All contacts of your organization at hand thanks to integrated contact book: Replace existing distribution lists, phone chains or WhatsApp...

Get in touch, without a mobile number ➔

 

No free tier

1 or 12 months contract period

Prices on request

Test 30 days without obligation

 

Unlimited number of users

Test 30 days Free of Charge

Channels, Private and Group Chats

File Storage

Calendar Tool with Synchronization

Integrated Survey Tool

Voice and Video Calls

Video Conferencing

Branding: Own Company App

Private Cloud or OnPremise

Individual Extensions

Test 30 days without obligation

Individual contract terms

Prices on request

 

 

Unlimited number of users

Test 30 days Free of Charge

Channels, Private and Group Chats

File Storage

Calendar Tool with Synchronization

Integrated Survey Tool

Voice and Video Calls

Video Conferencing

Branding: Own Company App (optional)

Private Cloud or OnPremise (optional)

Individual Extensions (optional)

 

Threema Work

 

Zero-knowledge security

Efficient employee communication

Powerful user management

Comprehensive security parameters

 

More Than Just Messaging

Cutting-Edge Secure Messenger for Companies

 

Threema Work is an instant messenger that meets your employee’s needs: it’s easy to use and packed with features. Offer your employees a secure and privacy-compliant alternative to regular messaging services for efficient team communication.

Secure and proven messenger for companies as an alternative to regular chat apps

 

Administration Tool

Learn more →

The backbone of the business communication software Threema Work is its management cockpit. This is where you define the ways in which your employees can use the Threema Work app – regardless of whether they're using corporate devices or their own (BYOD).

 

 

Broadcast

Broadcast

Learn more →

With a single click, you reach the entire workforce, individual departments, all suppliers, or specific customers. Threema Broadcast offers the perfect communication channel for every use case.

No free tier

 

Essential

For companies with only a few users and low demands on business features

 

Per user, per month

 

$ 2.00

Annual payment

 

Max. number of licences: 50

POPULARProfessional

Professional

For companies with high standards regarding customization, administration, and automation

 

Per user, per month

 

$ 3.50

Annual payment

 

Max. number of licences: Unlimited

Advanced

For companies with low requirements in terms of customization, administration, and automation

 

Per user, per month

 

$ 2.50

Annual payment

 

Max. number of licences: 500

 

All app features

 

 

 

Management Cockpit

 

 

 

App configuration

 

 

 

Threema Broadcast

 

 

 

APIs

 

 

Basic Support

Support & Customer Success

Premium Support

Standard Support

 

Spideroak Orbitsecure

“PROTECT YOUR MULTI-PARTY LAUNCH ENVIRONMENT

ENSURE THE INTEGRITY AND CONFIDENTIALITY OF YOUR DATA AND SYSTEMS.”

Securing Space-Based

Communications

Communicate on any system with confidence.  OrbitSecure provides end-to-end security on vulnerable systems and networks.

 

OrbitSecure automatically embeds airtight security into your commands and data using secure data compartments (SDCs).

 

Now you can confidently store or transmit information anywhere. 

No free tier

Specialized for space communication and deployments, but follows OOB recommendations

Salt

“The Secure Communications Solution you can trust

 

With advanced security and encryption, you can trust that your data is protected with Salt. Whether you’re sharing it over mobile or desktop devices, meetings and conversations are now as productive and private as those held in person.”

Salt App Features

Secure Messaging

Our bespoke solution provides users with private and secure real-time messaging and group chat for their Salt contacts.

 

Secure Voice Calls

Our secure solution offers one-to-one calls and conferences for up to 16 participants, as well as encrypted VoIP calls worldwide.

 

Encrypted File Transfer

Salt enables secure transfer of confidential documents and sensitive images with end-to-end encryption for multiple attachments.

 

Message Burn

Our burn feature completely erases information from all devices, either manually or with a timer setting.

 

Message Broadcasting

Share live alerts, messages, images, and documents freely and quickly with large groups within an organisation.

 

Screenshot Protection

Administrators can restrict users from taking screenshots for optimal internal security. If taken, users will be notified immediately.

No free tier

 

Highside

“By leveraging always-on end-to-end encryption, default zero-trust authentication, and granular role/attribute-based access controls, HighSide helps organizations retain full control over when and where their data can be accessed, on what devices and by which authorized users.

 

HighSide empowers your team to securely store, share and collaborate on your most sensitive data via a hyper-secure file sharing and collaboration platform designed to meet even the most stringent compliance regulations and data governance requirements.”

HighSide One: Features & Capabilities

 

File Sharing

Collaboration

Data Management

Messaging

Voice & Video

Access Control

Compliance

Deployment Options

 

 

 

PROCEDURE

BEFORE

  1. Have a plan

    1. Follow best practices: PACE (primary, alternate, contingent, emergency)

      1. PACE (communication methodology) - Wikipedia 

    2. Be granular: per department, per team, per role

    3. Identify your attack surfaces

  2. Review and update your plan regularly

  3. Hold fire drills and test your plan

DURING

  1. Notify all staff via emergency one-way communication

    • If systems are compromised, you may need to inform team members to not even log into things. And you need to tell critical teams that something is happening and where to do

  2. Assemble on out-of-band communication platform

    • Chaos vs. prescribed

    • Why do this on a collaboration tool instead of traditional communication like SMS and email?

  3. Stay in touch

    • Staying in touch is critical.

    • Panic is the enemy

    • You can be your own worst enemy

  4. Analogies:

AFTER

  1. Review what happened holistically

  2. Share what was learned, what worked, what didn’t

  3. Update your business continuity plan based on feedback

FURTHER READING

Related content