Guess who wants to cash-in on French BlackBerry ban? You got that right – emoze, the company that provides the similar-as-RIM’s push-email service. However, unlike RIM’s, emoze’s solution doesn’t require storing the data on its servers — and if you recall that was the prime reason for banning the use of BlackBerry devices for the French elite. Furthermore, while RIM’s push-email works on BlackBerry and some other selected smartphones, emoze works on any Pocket PC, smartphone or PDA device.
Earlier this year, emoze was upgraded to version 1.4 and is now more optimized than ever. Personally, I find it as a solid push-email solution — I’ve spent a week trying it and all I can say is that I love it. Then again, a week later I’ve decided I don’t want to enslave myself with the push-based email service, so I pulled it off of my phone… Full release after the jump.
RANAANA, Israel, June 26 – A French Government ban on the RIM BlackBerry on 20 June 2007, citing a security risk, has created a wave of concern around the world. Some governments allow the device to be used for declassified data and low levels of confidential information, but for classified information, the system is not authorized for use by many governments and agencies. The main security concern is that Blackberry subscribers’ emails, attachments, contact lists and diaries are not only transmitted to the mobile devices, but are also stored on third party servers along the way.
Unlike Blackberry, emoze provides push email service to all mobile devices with a very high level of security without storing the data on its servers.
According to Benny Ballin, CEO of emoze, “Having a false sense of security is far worse than having no security at all. Our system deliberately only routes traffic and does NOT duplicate or store any data en route. With emoze, data is pushed from your exchange (or any other emailing program) to your mobile device, maximizing security and privacy levels for the individual and organization. Personal and corporate information remains only on your own secure server and the individual mobile device.”
Individuals and companies alike, are rightly concerned about the security of information – whether emails, contact lists, calendars or documents – especially these days as, increasingly, our data follows us around with our mobile phones and PDAs. “With mobile communications sometimes unreliable, with frequent line drops, emoze enables real-time push messaging and synchronization without compromising security through a “push only when available” approach to the push and sync protocol,” adds Ballin. “This means that messages will be transferred to or from the mobile device only when the mobile device is connected to the network. In the case where the mobile device is disconnected or unavailable, the user’s private data remains safely in the user’s private messaging server without being duplicated to an intermediate storage.”
Avoiding data duplication reduces the chances of data loss to a minimum and eliminates the risk of ‘data sniffing’ by a third party. Highest level of security is a major issue in emoze’s design consideration. The emoze solution implements an encryption mechanism in addition to its proprietary synchronization that not only increases levels of security and privacy but adds speed and efficiency and dramatically reduces the costs of unnecessary hardware.
As a default, emoze implements end-to-end security and maximum data and mobile networks protection. emoze’s Military Grade security standard includes protection of the internal network and of the mobile device. All messages are encrypted behind one’s firewall (either home or corporate network), and can be decrypted only by the user itself once they reach the right mobile device or PC. All encryption keys are unique and can be used by a specific user only. Encryption keys are stored in the user’s mobile device and PC. No data decryption or access to any encryption key, at any point, is possible anywhere on the data network or over any wireless network.
For corporate users and SOHO customers, the solution can be further customized to use any preferred security mechanism or protocol required by the customer (as a plug-in) to fulfill any specific need.