SOURCE: Liquid Machines

June 04, 2007 09:00 ET

Liquid Machines Announces Availability of FIPS 140-2 Validated Cryptography for Public Sector Organizations

Leading Enterprise Rights Management Vendor Enables United States Federal Government Agencies and Organizations to Persistently Protect Sensitive Information Using FIPS 140-2 Validated Cryptography

WALTHAM, MA--(Marketwire - June 4, 2007) - Liquid Machines, Inc., the leader in Enterprise Rights Management (ERM) solutions, today announced that its Liquid Machines Document Control™ software uses an embedded FIPS 140-2 validated cryptography module, meeting the requirements defined by the National Institute of Standards and Technology's (NIST) Federal Information Processing Standard (FIPS) 140-2 regulation. FIPS 140-2 is the most recent set of regulations and mandates developed by the NIST, putting requirements and standards in place for the federal government's use of cryptographic modules.

FIPS 140-2 is a government standard that helps validate security claims for technology products using cryptology to ensure the secure transfer of information. The FIPS 140-2 standard is recognized by the U.S. government, as well as federal agencies in Canada (CSE), Europe and Australia and is used by financial organizations due to the sensitivity of the information they share and store. FIPS 140-2-validated encryption products also help companies meet the IT compliance requirements of the Sarbanes-Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA) and other federal directives.

"Our public sector customers demand the greatest level of security to protect their sensitive information," said Mike Ruffolo, CEO of Liquid Machines. "With the availability of the industry's first and only enterprise rights management solution with FIPS 140-2 validated cryptography, we continue to meet our customers' requirements and extend our leadership in the public sector market."

Liquid Machines Document Control enables agencies and government organizations to apply multiple levels of protection to information so it can continue to be shared in a collaborative environment without the fear of inappropriate disclosure or unauthorized use. Liquid Machines' unique approach puts the security with the data itself -- meaning that the security policies and controls remain with the data for its entire life -- as it travels from machine to machine, within and beyond the organization -- or if attempts are made to copy or excerpt it. Customers use Liquid Machines to enable scenarios such as secure, inter-office or inter-agency collaboration by applying security at the information level.

Other product benefits include the following:

--  Protect information anywhere it goes: Information is secure whether it
    is placed on a laptop, CD-ROM, file share, USB storage device, or
    BlackBerry handheld.
    
--  Expire access or usage rights to information at any time:
    Administrators can set expiration periods, or revoke or modify rights at
    any time. Offline access can be managed as a separate control.
    
--  Control policy definition and usage rights at a granular level: Base
    rights on employee location, profile, rank, department, team, or the nature
    of the information itself. Control read, write, save as, cut/copy/paste,
    print and print screen.
    
--  Audit and report on information access and usage history: Generate
    compliance reports that trace the path of information usage in whole or in
    part, including unauthorized access attempts or administrator-level
    activity.
    
About Liquid Machines

Liquid Machines is the leading provider of Enterprise Rights Management (ERM) solutions that persistently protect critical business content and audit usage while enabling collaboration. Liquid Machines' Document Control and Email Control solutions allow companies in the consulting, financial services, government, manufacturing and healthcare industries to share information securely, within any application, wherever it goes, throughout its lifecycle. Liquid Machines ERM solutions help enterprises satisfy today's ever-increasing information security regulations such as Sarbanes-Oxley, NASD 2711, HIPAA and others, as well as implement and practice internal mandates for intellectual property security, product version control, or clinical data protection.

Based in Waltham, Massachusetts, Liquid Machines is privately held and is backed by Atlas Venture, Masthead Venture Partners, Goldman Sachs & Co. and Draper Fisher Jurvetson. For more information on the company and our vision for The Freedom of Security™, visit us at www.liquidmachines.com.

© 2007 Liquid Machines, Inc. All rights reserved. Liquid Machines, Enabling Secure Business, The Freedom of Security, Policy Droplet, Omniva, and the Liquid Machines logo are trademarks or registered trademarks of Liquid Machines, Inc. Product or company names mentioned herein may be the trademarks of their respective owners. The information contained in this document represents the current view of Liquid Machines, Inc. on the issues discussed as of the date of publication.

Contact Information