- Website: https://www.vera.com/
- Company size (employees): 50 to 99
- Country: United States
- Headquarters Region: North America
In 3 bullets, summarize why this company is different from the competition and deserves recognition:
• Vera provides the only way to confidently secure and manage sensitive data with Always-on File Security: this gives confidence that data is secure both inside and outside the organization; sensitive company and employee data is no longer at risk, and without compromising their workflows. Users have the ability to encrypt and control access to sensitive files of any type, restrict access to those sensitive files once they have been emailed or shared with external users. Solution allows control of specific actions (e.g. view, edit, print, copy/paste, watermarking) that individual users can take on sensitive files in core authoring applications including Microsoft suite, CAD tools, Adobe suite, and Email.
• Leverage Modern Collaboration Securely: when using cloud collaboration tools, Vera secures any type of file with Dropbox, Box and SharePoint. By decoupling the encryption keys, this enables access to sensitive data from the chosen cloud collaboration vendor. Users are able to store and share files in the cloud the same way before access control was implemented.
• Mitigate Compliance Risks: regulatory bodies continue to implement rules and penalties related to maintaining privacy and security. Vera enables organizations to achieve a state of continuous compliance while allowing business to be executed. With Vera, users can now control which users can access files containing PII, PHI or PCI. This mitigates exposure to fines (GDPR, HIPAA, NYDFS), litigation costs, and preserves revenues, customers and reputation. Solution provides detailed audit logs and defensible proof that we are protected against data breaches.
In less than 300 words, summarize the achievements of the company in the nominated category
Today’s organizations are collaborating outside their borders, now more than ever, working on proposals, contracts, and housing customer data, intellectual property, and financial reports that are critical to protect. But consider this – the minute you email or share a file or link, you lose control over how, when, and where that data will be used. You need a way to manage access in real-time, even when the data is in someone else’s hands.
Vera secures sensitive data through its entire life cycle, everywhere it travels, no matter who has it or where it’s stored. We help you protect confidential data at the point of its greatest vulnerability—when it’s being used by others, and while it travels outside your perimeters into unmanaged domains, devices and applications.
Built on a scalable, easy-to-integrate platform, Vera attaches encryption, security and policy directly to the data itself, giving security practitioners and IT teams the power to control it, no matter where it goes.