What does Absio technology do?

In a world where data is becoming increasingly mobile, protecting that data is also becoming increasingly unattainable. That’s why we’ve decided to do something about it. Our patented technology builds controls into each digital object, so that any use or exchange of the data is at the owner’s discretion. Each object is individually encrypted and is further stored in our patented obfuscating file system—where even the filenames don’t indicate what the digital object contains. If a device is lost, stolen or hacked, exporting data from an Absio application reveals nothing but thousands of obfuscated files containing distinctly encrypted objects. This means that if your data is ever accessed illegitimately it yields nothing of value.


What is Absio Dispatch?

Dispatch is an easy-to-use, multi-platform email application that automatically secures and controls messages and attachments everywhere they exist, with enterprise administration and archiving capabilities. Each message and attachment is individually encrypted in storage and in transit automatically. In addition, Dispatch allows the sender to control whether their recipients can save, print, copy, forward, or reply all to the message, and whether they can save, print or copy attached file content. The sender can also set messages to expire at a given time or recall previously sent messages.


How does it work?

Dispatch works just like any other email application with the added ability to control what your recipients can do with your messages and attachments when received. You compose a Dispatch message, select your recipients, and select what, if any, controls you want to place on the message and attachments. When you click send, your Dispatch message is automatically encrypted on your device before being transmitted to your recipients. The encrypted Dispatch message is sent to your recipient via an encrypted internet connection. Upon receipt, the Dispatch message is stored encrypted on your recipient’s device automatically and is only decrypted when viewed with the Dispatch application. If your recipient does not have Dispatch installed, they automatically receive an invitation to download the free app from our website.


Why should I worry about email?

Businesses use email every day to store, distribute, and discuss critical information. Email has replaced phone calls and in-person meetings for many private conversations, and is the most frequent tool used to share files. While your organization may have some form of secure file repository, how many copies of sensitive email conversations and confidential files are stored on your email service provider’s servers, as well as your employees’ and their recipients’ devices? From the standpoint of security and control, email is likely the most out-of-control application used by your organization. In essence, each time an employee sends an email, you are outsourcing the security of the communication and any attached files to the recipients, whether they are inside the organization or not. As one of the largest repositories of confidential files within any organization, email is fertile ground for hackers, at high risk for employee mistakes, and a treasure trove of information in litigation.

What do you need to actually secure email?

Ensuring the security of email communications requires that the information itself be secure everywhere it is stored or sent, and controlled once accessed to prevent unintended distribution or misuse. However, it also requires an email solution that is easy to use and manage. High security with poor usability ensures low adoption, and therefore low security. Dispatch provides both the industry’s most secure email application and an intuitive user experience designed to maximize adoption.

How does Dispatch differ from other secure email and file sharing products?

Dispatch is an easy-to-use application that offers a higher degree of security and control. Many secure email and file sharing products are actually web portals for downloading content, and simply don’t give the sender and recipient the ability to have a secure conversation. In fact, in most cases, the recipient can only access sender content, and not initiate secure communications. Anyone can install the Dispatch application for free and initiate secure communications with other Dispatch users. In addition, the vast majority of email security products use an encrypted internet connection to protect your email while in transit to another location, but do nothing to secure the actual files in storage on the multiple servers and devices where copies of that email end up. Dispatch uses a new message and file exchange protocol that automatically encrypts every email message and attachment individually, and maintains that encryption everywhere—on the sender’s device, in transit, in the cloud, and on the recipient’s device. And unlike most service providers, Absio does not have access to user passwords or encryption keys. This means we can't read anything stored or sent via our server, and therefore, can't enable anyone else to do so (even if we are subpoenaed).

Can Dispatch be used on any device?

You can download and use the Dispatch application on as many devices as you would like. Dispatch is available as a plugin for Microsoft Outlook® for Windows®, and as a standalone app for Windows and Apple® computers, and Android™ and Apple (iOS®) mobile devices. Dispatch for Outlook works with or without Microsoft Exchange®, and is compatible with Office 2010, Office 2013, Office 2016, and Office 365™.

Why is Dispatch an application instead of a web portal?

There are many advantages to using an application to securely communicate with your colleagues, vendors and business associates. First, an application provides both the sender and recipient with a full-featured, easy-to-use interface that works just like any other email product—no need to go to a separate web portal or jump through multiple hoops to decrypt a single message or file. Second, this allows all encryption and decryption to take place on the local device, so Absio never has access to your password or encryption keys. This means we can’t read anything stored or sent through our server. And since we can’t, we are unable to give anyone else the ability to access your information either. Lastly, this ensures that your messages and files are automatically stored encrypted on your recipients’ devices. Right now when you send an email, you are forced to trust that your recipients have taken the proper security measures to keep your email conversations private. With Dispatch, you know that every conversation will be stored and shared securely by default, and can only be distributed according to your rules. So, yes, there is an app for that. 

Why do I have to connect with other users before I can send them a secure message?

This simple connection process (similar to that used in social media) is used to swap encryption keys, so only you and your authorized recipients can view your secure messages. A connection request is automatically sent to any Dispatch recipient who has not yet connected with the sender, so there is no disruption is user workflow. Absio has designed this process so that we never have access to our users’ encryption keys, and therefore, can’t read our users’ content or give anyone else the ability to do so. Dispatch does not interfere with your ability to send and receive traditional email, so you won’t miss out on hearing from someone that is not yet one of your Dispatch connections. As soon as two users have mutually agreed to connect, they can begin sharing encrypted messages and files with one another just like any other email service.

Can secure Dispatch messages be accessed offline?

Yes, since all encryption/decryption takes place on your device, you can access any Dispatch messages or file attachments that have already been downloaded to your device. You won’t be able to send or receive new Dispatch messages until you connect to the internet.

What information can Absio share with other entities if compelled to do so?

Absio will not sell, rent, share or distribute any of your personally-identifiable information with any third party, unless required to by law. If we are legally compelled to share information with an outside entity, Absio can provide a customer list (billing information) and copies of individually-encrypted, controlled digital objects. Absio never has your password or encryption keys, so we cannot provide any way to decrypt your private information. Put simply, we can (and would, under a lawful subpoena) provide a mass of distinctly-encrypted objects, each encrypted with a different key and a nonsensical name, without significant metadata. That means that any entity that has the objects would have to individually decrypt those objects using extremely expensive and slow brute-force decryption techniques. The more encrypted digital objects there are, the bigger the computational problem for the entity holding your data. While we cannot say that it is impossible for an entity that has seized your data to decrypt any significant portion of it, it would be an extremely difficult and unlikely event.

Request a demonstration for your organization today.