CIO Influence
CIO Influence News Networking Security

U.S. Army Combat Capabilities Development Command (DEVCOM) Awards Ubiq Security a Small Business Innovative Research (SBIR)

U.S. Army Combat Capabilities Development Command (DEVCOM) Awards Ubiq Security a Small Business Innovative Research (SBIR)
Engagement will utilize the companyโ€™s API-based platform to advance the military’s encryption capabilities.

Ubiq Security, an API-first and Forbes Top 20 security startup, announced that it was awarded an SBIR contract with the U.S. Army DEVCOM. Ubiqโ€™s platform will be utilized to help deliver highly efficient, more scalable, and innovative encryption capabilities.

Ubiqโ€™s API-based encryption platform uses a cloud-based model to deliver encryption and centralized key management capabilities, addressing challenges the Department of Defense commands are currently facing. Ubiqโ€™s platform provides fast, frictionless, and scalable encryption capabilities across most application and device types, eliminating complex, and disparate approaches available today.

Recommendedย ITechย News: ย Terralogic Solutions Inc. Invests in Microsoft Focused Technology Company Tridius Technologies

โ€œExpanding our existing footprint with the Department of Defense and Department of Homeland Security is an incredible opportunity to leverage our platform to help the U.S. Army adopt a more modern, rapid, and extensible approach to safeguarding sensitive information,โ€ said Wias Issa, CEO of Ubiq Security.

Ubiq has existing customers within the Department of Defense, Air Force, and Department of Homeland Security, several of which have utilized the Ubiqโ€™s platform to improve and scale data and communications encryption capabilities.

โ€œOrganizations are looking to leverage API-based solutions to quickly integrate critical capabilities into their product, applications, and infrastructure, saving them time, effort, and capital to build custom, costly, and error-prone solutions. This is especially true with encryption and key management. These are complex domain areas that are very difficult to get right, yet very easy to get wrong, with potentially catastrophic consequences. APIs are the consumption model of choice for the worldโ€™s leading and most forward-thinking organizations and Iโ€™m excited that the U.S. Army is embracing the approach,โ€ said Issa.

Recommendedย ITechย News: ย Cybersixgill Accelerates Vulnerability Management with Swimlane Automation

The San Diego-based, technology start-up has built an API-first developer platform that eliminates the traditional complexities of encryption and key management, allowing developers and information security teams, even those without encryption or cryptography expertise, to integrate data encryption directly into applications in minutes, with nothing more than a few lines of code and two API calls. Teams can encrypt data effortlessly across diverse applications and programming languages, cloud environments, and storage types.

Behind the platformโ€™s APIs is a SaaS-based software layer that eliminates the guesswork, jargon, and complexity of cryptography and encryption, through a simple dashboard, so developers can be up and running in just minutes. The dashboard allows developers or members of their security teams to select from proven, best-practice encryption models and policies for all their applications in a central location, provides key management and FIPS 140-2 Level 3 compliant key storage, and a complete log of key access and activity.

Recommendedย ITechย News: ย Fastest 5G โœ“ Most Available 5G โœ“ New Data From Opensignal Confirms T-Mobile 5G Leadership

Related posts

Incedo Consolidates Its Cybersecurity Defense With Check Point Software Technologies

PowerSchool and Learnbase Partner to Drive Digital Transformation of Education in Brazil

PR Newswire

New Cybereason Subsidiary Empowers U.S. Government Agencies To Detect Malicious Operations Faster

Leave a Comment