US company acquires Swiss security startup totemo

More than 3.8 million users in 1,800 companies and organizations across all industries rely on totemo’s platform for secure electronic communication. Kiteworks, which governs and protects sensitive digital content moving within, into, and out of global enterprises has now acquired totemo.

Since 2001, totemo, a Zurich-based company with an office in Sofia has been providing solutions to industry and government to meet the increasing demands to maintain privacy when exchanging sensitive information, including secure E-Mail and file transfers. With more than 1'800 customers worldwide including some of the largest multinational enterprises in the German, Austrian, and Swiss markets, over 3.8 million user licenses active and more than 6'000 domains protected, totemo is a leading specialist for email encryption in Europe.

Totemo has now joined American company Kiteworks, which empowers organizations to manage risk and ensure compliance effectively and efficiently of every send, share, receive, and save of sensitive content. The Kiteworks platform accomplishes this by unifying, tracking, controlling, and securing all sensitive digital content communications sent through the platform via email, file share, managed file transfer, web forms, and application programming interfaces (APIs).

The totemo acquisition extends coverage of the email capability of the Kiteworks platform from user or plug-in activation within the platform into the mail client natively. This provides automatic coverage of all sensitive digital content sent and received via email. Additionally, as totemo’s technology is integrated into the Kiteworks platform in coming months, email content metadata on users, apps, devices, networks, protocols, and files will be centrally ingested and normalized.

This unified intelligence will enable organizations to implement centralized and comprehensive tracking and controls to greatly reduce the risk of exposure of private information and more effectively meet regulatory compliance requirements. Enterprises that leverage this integrated intelligence will expand and improve their overall cyber-defense strategy—expanding privacy protection and compliance beyond data center, cloud, and wide-area network (WAN) perimeters into third-party sensitive content communications.

(Press release/RAN)