https://store-images.s-microsoft.com/image/apps.5633.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.4a1442a2-baa7-4985-a876-493c3fa69556

XQ Zero Trust Transfer Gateway

XQ Message, Inc.

XQ Zero Trust Transfer Gateway

XQ Message, Inc.

Zero Trust Data Transfer Gateway for VPN Replacement & API protection

Challenges
VPN technology faces challenges with data leakage, management overhead and aging credential theft.
Are you worried about moving your data to the cloud? XQ solves the problem of secure data portability.
Provide the most secure, auditable, and compliant data transfer available on public and private networks.

1. Centralized Responsibility Security Model, data and keys vulnerable in the same system

2. No chain of custody for data, opens customer to compliance violations

3. Data access and network access joint hosted, network credentials give complete data access

4. Open to aging credentials, ransomware and man in the middle attacks, hijacking token and credentials to exfiltrate data

Shared Responsibility Security Model
- XQ’s Zero Trust Data technology allows the customer to keep exclusive control of the encryption keys
Forensic level chain of custody and data sovereignty
- With a complete audit trail of every data object, XQ can be used to migrate, geofence, and protect data across disparate networks
Mitigates risks from misconfiguration or bad internal actors
- Separates network access from data access
Dynamic credentialing mitigates risks from ransomware and man in the middle attacks
- Protection and control travel externally with the data to blow up exfiltrated data
Benefits
XQ Transfer elevates your network to zero trust data access by microsegmenting and encapsulating your data to control access both inside and outside your network, application or cloud.
VPN Replacement
- Minimize data and maintenance expenditures associated with secure data transfer, while simultaneously enhancing security and bolstering auditability.
API Protection
- Trust is never assumed, and every request to an API is treated as potentially malicious, regardless of its source or origin.
Compliance
- Data access controls and Data Loss Prevention policies create a unique secure chain of custody for each data object.
Features
Data Encapsulation
XQ microsegments & encrypts data during transfer, meticulously tracking and controlling access at every stage of data's journey.
Remote Data Control
Turn exfiltrated data into digital dust by destroying or suspending keys.
Data Sovereignty
Data access controls and Data Loss Prevention policies enforce jurisdictional policies and geofence data access.
Simple Compliance
XQ is built on the NIST standard and provides proof of secure chain of custody for each data object for global compliance standards.
Ransomware
Reduce your blast radius to one. Data access credentials are unique to each data object.

US Dept. of Defense Zero Trust Data Policy
The Department of Defense published a Zero Trust Strategy paper on November 7, 2022, with the new strategy representing a significant change in the approach to protecting data. XQ is the first company to have a Zero Trust Data solution that has all seven components as defined by the DoD.
GDPR Data Sovereignty Solution
Organizations can meet data residency and localization requirements for GDPR by ensuring that data is stored locally and is accessed only in the country of origin. It is easily deployable across multiple systems and greatly reduces compliance and reporting requirements. Plus, organizations maintain a full chain of custody at the data packet level across disparate networks.

XQ Turnkey CMMC Solution
Companies doing business with the U.S. Federal Government must meet updated CMMC regulations starting in 2023. XQ’s audit assistance shows how they protect Controlled Unclassified Information as well as Covered Defense Information, and the corresponding NIST 800-171/800-53 controls. With its partners, the XQ Email, Data Transfer and Cloud Storage Solution helps organizations meet or exceed ALL 110 NIST SP 800 - 171 controls and the corresponding DFARS controls.
https://store-images.s-microsoft.com/image/apps.33874.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.4a4fd524-bc51-4274-8bc6-002088db4d3e
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.33874.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.4a4fd524-bc51-4274-8bc6-002088db4d3e
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.41621.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.04ad384e-e636-4b8f-b58c-4de6455b5c91
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.59295.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.51db8786-4605-4029-9c45-cc5f503cff4f
/staticstorage/8165fe0/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.58851.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.187f92e3-d281-47cb-94ee-9138626efa4d
https://store-images.s-microsoft.com/image/apps.13417.96984975-b899-4b67-9860-47df89c7c8d4.ff1a8a51-b470-4eef-835a-2e1f146a5761.35e07808-e906-48cd-b300-5a4b4768c617