Welcome!

Containers Expo Blog Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

News Feed Item

DocWallet -- The secure documents manager for iPad and PC

BONN, Germany, Feb. 24, 2013 /PRNewswire/ -- DocWallet is the name of Deutsche Post's solution for anyone requiring extra document security when using mobile devices. Word of the system's reliability and user-friendliness has already spread throughout the world. In the first five weeks since its release the app recorded just under 30,000 downloads. Increasing demand is being seen, especially in the US.

What's the reason for DocWallet's rapid success?

DocWallet is a user-specific electronic document map for iPad and Windows PCs. Document confidentiality is ensured via end-to-end document encryption (AES/RSA) using dedicated DocWallet servers in Germany. Data is also encrypted when synchronising with your PC. These files can be viewed on authorized devices only.

Tablets and smartphones have become a permanent fixture of everyday work and private life. The iPad in particular is seeing greater use at the workplace. But up to now, integrating mobile devices into a company's IT system has posed a previously unsolved problem: How can confidential documents be securely protected for mobile use? DocWallet is Deutsche Post's solution to this problem.

"This service is easy to use, absolutely secure, and it will make life a lot easier for iPad users. It's intended for people with high mobility needs who need continuous access to personal documents and a high degree of data security," explains Marco Hauprich, Deutsche Post's product manager for DocWallet. "There is no comparable product on the market that combines rigorous security standards with a user-friendly interface."

Harald Lemke is Deutsche Post's technical lead for DocWallet. "Our security concept responds to the troubling development today that central servers are increasingly the target of hacker attacks," says Lemke. "This is why DocWallet only transfers and saves documents.in encrypted format."

Referring to recent hacker attacks of high-profile cloud providers, Lemke adds: "Our system is configured so that neither security keys nor user passwords are ever stored on the DocWallet server. So even in the event of a security breach, our customers' confidential documents remain inaccessible to attackers. Confidential document management has of course always been one of Deutsche Post's core competencies and DocWallet is very much in line with this tradition."

With DocWallet users can:

  • Save and read PDF documents, manage folders
  • Synchronize PDF documents between Windows PCs and iPads
  • Add comments to PDF documents on an iPad

All without the usual security risk.

DocWallet consists of a Windows client and the associated iPad app with integrated reader, which makes it possible to view and manage documents on the iPad. The PC synchronization feature ensures that documents are always up to date, even when being accessed by several devices simultaneously. Users can also authorize any number of devices (PCs, iPads) for their DocWallet account.

Every authorized user is always up to date – One click and the entire team is. "DocWallet can be used by entire teams," explains Deutsche Post manager Marco Hauprich. "So supplying mobile users with up to date information has become a much faster and easier process."

The secure solution for modern document protection, DocWallet is available at www.docwallet.com and at Apple's app store. DocWallet is free for the first month, after which the following prices apply: 5.99 euros for one month, 14.99 euros for three months, 49.99 euros for one year and 89.99 euros for two years.

Further information is available at www.docwallet.com and at Apple's app store.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...