We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Covata – Military-Grade Cybersecurity (Advanced Solutions)

Eytan Morgenstern Technical Interviewer and Writer

Getting the top-level security is a must for many organizations in an increasingly complicated cyberworld.  Using experience garnered from military-grade security solutions in the Australian Department of Defense, Covata has created unique solutions to deal with the myriad threats in play.  Mike Fleck, Covata’s VP Security, talks about cybersecurity concerns of small businesses and today’s most significant data security and compliance challenges.

Tell us about Covata and how you got involved in data security?

Covata got its start developing a solution for the Australian Department of Defense to enable secure battlefield communications. The resulting technology was a very powerful and secure approach for end-to-end encryption of data, with identity-based encryption keys. Basically, information is always encrypted and it can only be decrypted by authorized users, not someone who happens to intercept the data or who breaks into the system where the information is stored. We adapted that technology to build a very secure yet usable enterprise file sync and sharing solution (think basic services like Dropbox but with superior features and military-grade security). More recently we’ve noticed the need to apply these data security concepts to any data, anywhere it resides.

There are many different types of data security products on the market.  What is unique about Covata?

Yes, indeed. The security space has thousands of security products across hundreds of niches. Differentiation is critical for suppliers and the people who buy those solutions. At a high level, Covata is unique in that our technology integrates several data security solutions into a single platform without compromising quality. Our data discovery and automated classification engine is more mature than most of the stand-alone competitors. Our encryption and key management is more scalable and ‘modern’ than traditional data-at-rest encryption vendors. Our access governance capabilities are superior because they are natively integrated with encryption, even controlling access by privileged IT administrator accounts.

From a philosophical standpoint, Covata stands out due to its unwavering dedication to providing practical solutions that effectively address the current challenges in data security and management. While the security industry frequently introduces untested methods to tackle future problems, Covata recognizes the pressing need to address the present, fundamental issues that chief information security officers are still grappling with.

What are Covata's primary products and services?

Covata currently provides enterprise solutions for data discovery, automated data classification, file encryption, access governance and activity monitoring. Our products help businesses and governments find and secure their sensitive files no matter where they reside. While these capabilities can be delivered as a platform, we do have distinct, tailored solutions for certain use cases. For example, SafeShare is the subset of our platform that provides highly secure but usable Enterprise File Sync and Share (EFSS) services. CipherPoint Eclipse is the subset of our platform that secures information in SharePoint, file servers, and Office 365.

CipherPoint Eclipse Content Scanner

What value do you provide clients/customers?

Like all, or at least most, security companies, Covata helps clients reduce the risk of a data breach or privacy violation. Unlike most security companies, Covata also helps to increase business efficiency and productivity. Data classification, for example, enables all kinds of positive business outcomes such as repeatability and improved quality of business processes. Secure file sharing allows businesses to achieve worker productivity gains through collaboration, but for use cases often thought to be too sensitive to allow easy sharing of information internally and externally.

Can you discuss the types of clients you work with?

Our solutions are in use by government agencies, large businesses and small businesses around the world. The issues our products solve are felt by most organizations, across multiple industries. Having said that, most of our customers are large enterprises in financial services, healthcare, and insurance.

What are the issues that Covata deals which affect smaller businesses and even individuals?

Small businesses have many of the same security concerns as the larger enterprises and governments agencies, but often lack the budget and personnel to purchase and administer complex enterprise systems. So, many security solutions either don’t get installed or don’t get properly operated due to complexity.

At Covata, we don’t expect our customers to become experts in machine learning, cryptography, etc. Our solutions are easy-to-use and deploy, and allow our customers to focus on their core business rather than focus on administering our solutions. This is incredibly valuable for small businesses that need high-quality solutions that they can both purchase and operate cost-effectively.

Let’s take a step back for a moment. What do you see as the most significant challenges to data security and compliance?

Great question! The most significant challenges to data security and compliance are that businesses don’t know what sensitive information they have or where it all exists. Employees and partners create so many sensitive files and emails each day, and they are stored across many clouds, servers, and devices.

Compliance with the EU’s upcoming General Data Protection Regulation (GDPR) has caused many executives to realize they can’t possibly manage their responsibilities according to GDPR unless they understand where personal data exists – always and in all places. Many existing data security technologies, like network data loss prevention, aren’t adapted to the new ways that users work (i.e. using Software as a Service and other cloud services).

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Eytan Morgenstern is a seasoned technology writer. He loves learning about new innovations, meeting the people behind them, and sharing their story.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address