Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Digital Workplace Firm WorkJam Acquires Secure Communications Firm Peerio

Montreal-based digital workplace solutions provider WorkJam has acquired the Canadian secure communications provider Peerio Technologies together with its entire team.

Montreal-based digital workplace solutions provider WorkJam has acquired the Canadian secure communications provider Peerio Technologies together with its entire team.

With growing mobility and the dispersion of workforces, WorkJam is a firm predicated on improving corporate communications to maximize the knowledgebase locked inside workers by managing and optimizing the employee-employer relationship.

Peerio is a firm providing end-to-end encrypted communications.

Consider one use case: healthcare. WorkJam offers improved communications between corporate and employees that aligns everyone to the goals and vision of the company. But there is one area not so well-covered: employee-to-employee communication that doesn’t directly involve the corporate center.

Traveling health visitors speak amongst themselves. One employee might not be able to make a scheduled visit. Rather than go back to head office, the health visitor might text a colleague asking if that colleague could call in and see a particular client.

That second health visitor might text back, “Sure, I’ve got two hours free this afternoon. Tell me about the patient.”

All of this — name, address, health details — could be sent across the employees’ preferred chat method across the internet. The security risks are obvious; and the act could bring the organization into conflict with health regulations in the Americas and perhaps GDPR in Europe.

While this example concerns the health industry, similar principles will apply to almost any industry with a dispersed workforce where one employee might ask a colleague, rather than head office, for advice. 

Advertisement. Scroll to continue reading.

“When it comes to communicating with a large dispersed group of non-desk workers, control over data security is everything,” explains Steven Kramer, CEO and co-founder of WorkJam. “Organizations can no longer afford the immense risk of their employees using unsanctioned and unsecure communication systems that cause a company to lose control over its confidential data and the personal data of its employees. With the addition of Peerio, WorkJam now provides the most secure digital workplace platform available — a platform that exceeds the most demanding security standards any enterprise could have when it comes to communicating with their workforce.”

Peerio adds three separate secure modes of communication for WorkJam users: live chat, messaging and channels. Live chat would probably be used in the healthcare example above. The two health visitors could communicate directly with each other over an end-to-end encrypted channel. No regulations could be broken, and the patient’s needs would be served.

The messaging feature allows files to be sent direct to the user’s inbox. The channels option allows staff to be put into groups — say, a group of health visitors with a specific expertise. Peerio user Ernest Yale, CEO and founder of Triotech, explains, “All our sensitive information stays within Peerio. It’s user-friendly. We can group our discussions and projects, control the amount of people in a group, add and remove people. We can essentially do collaborative work together. It’s a bit like Slack, but you know… private.”

Peerio Technologies was founded in 2014 by Vincent Drouin. The software is open source and cross-platform — running on iOS, Android, macOS, Windows, and Linux. Encryption is described as ‘fast encryption primitives from the NaCl cryptographic framework’. In-transit encryption is with TLS and supports perfect forward security (PFS).

Related: Microsoft Rolls Out End-to-End Encryption in Skype 

Related: NCSC Joins Secure Chorus to Promote End-to-End Secure Communications 

Related: Why Healthcare Security Matters 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cyber Insurance

Cyberinsurance and protection firm Boxx Insurance raises $14.4 million in a Series B funding round led by Zurich Insurance.

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...