XQ Message Comprehensive FAQ
General Company Information
What is XQ Message?
XQ is a US-based cybersecurity company that provides Zero Trust Data Protection solutions. The company secures sensitive data with Zero Trust technology, making encryption, access control, and auditability portable and persistent across cloud, edge, and hybrid systems.
What is XQ's mission?
XQ's mission is to safeguard data everywhere, empowering businesses to drive agility and innovation while protecting their reputation, customer trust, and compliance. They aim to make data self-defending across all environments while simplifying compliance and reducing risk.
What are XQ's core values?
Making Data Security Easier: XQ's platform simplifies the job of protecting data
Automate Governance: XQ automates understanding what data an organization has and who can access it
What is XQ's vision?
XQ envisions a world where businesses can innovate without compromising security, powered by a platform that enables real-time data classification and protection.
Zero Trust Data Platform
What is Zero Trust Data?
Zero Trust Data is XQ's approach to data security that assumes no implicit trust and continuously validates every transaction. It unifies security and compliance across environments with the ability to switch data access on and off remotely with a "control leash" to automatically stop cyber attacks and provide compliance.
What are the main components of XQ's platform?
Data Access Governance (DAG): Real-time data governance controls
Sovereign Data Access Control (DAC): Record-level and geo-access controls
Sensitive Data Discovery & Traceability: Secure chain of custody monitoring
Data Loss Prevention (DLP): Control leash enforced by zero trust data encryption
What environments does XQ protect?
XQ protects data across:
Cloud environments
Edge systems
Hybrid infrastructures
Email systems
Databases
File sharing platforms
VPN replacement solutions
Key Features and Capabilities
What is Data Rights Management?
XQ provides Data Rights Management at the record level everywhere data goes, with 74% improvement in data control capabilities through attribute-based tagging, role-based access control, encryption, and geo-restriction in one unified platform.
How does XQ's encryption work?
XQ uses zero knowledge encryption where even cloud-managed services cannot access data secured by XQ. Local key custodians within each jurisdiction enforce geofenced access, ensuring sensitive data is only available within authorized regions.
What is Attribute-Based Access Control (ABAC)?
ABAC and Data Rights Management at the record level helps maintain Context-Based Access Control and Compliance, providing traceability and secure chain of custody from the source.
What is XQ's "control leash"?
The control leash is XQ's remote enforcement capability that allows organizations to switch data access on and off remotely, automatically stopping cyber attacks and ensuring compliance through zero knowledge encryption and policies for each individual data object.
Compliance and Regulations
What compliance standards does XQ support?
CMMC (Cybersecurity Maturity Model Certification)
GDPR (General Data Protection Regulation)
HIPAA (Health Insurance Portability and Accountability Act)
FINRA (Financial Industry Regulatory Authority)
ITAR (International Traffic in Arms Regulations)
IEC 62443 (Industrial cybersecurity standards)
How does XQ help with CMMC certification?
XQ enables CMMC certification without requiring organizations to move to GCC High (Government Community Cloud High). The platform provides the necessary data protection and compliance controls while maintaining flexibility in cloud deployment.
How does XQ ensure GDPR compliance?
XQ prevents GDPR infractions and fines by:
Restricting all 3rd party data access and exfiltration to non-GDPR compliant regions
Enabling clients to encrypt all cloud data while storing keys within on-premises European infrastructure
Ensuring data cannot be accessed by US authorities via subpoena without client knowledge and consent
Leveraging global data localization requirements per the SHREMS II ruling
What is XQ's approach to data sovereignty?
XQ provides cloud-managed services that cannot access secured data, with local key custodians within each jurisdiction enforcing geofenced access. This ensures sensitive data remains only within authorized regions and prevents unauthorized international data transfers.
AWS Partnership
What is XQ's relationship with AWS?
XQ is part of AWS's Zero Trust for Government Partnership. The solution aligns to the NIST Zero Trust Framework with XQ fulfilling the Zero Trust Data component specifically for government applications.
Use Cases and Solutions
What industries does XQ serve?
Based on the compliance standards and use cases mentioned:
Government and Defense
Healthcare (HIPAA compliance)
Financial Services (FINRA compliance)
Industrial/Manufacturing (IEC 62443)
Any organization requiring GDPR compliance
How does XQ protect against ransomware?
XQ protects files from ransomware extortion through its Zero Trust Data Security approach, preventing insider threat data exfiltration and stopping what they call the "Snowden Effect" of unauthorized data access.
How does XQ enhance Microsoft Purview?
Integrating XQ's Zero Trust Data Platform significantly enhances Microsoft Purview's capabilities by adding advanced data protection, encryption, and access control features.
What is the XQ Vault solution?
XQ Vault is a quantum-resistant storage solution that works with S3 and Azure Blob storage, providing enhanced security for data analytics, particularly in government and defense applications.
Technical Resources and Support
Where can I find technical support?
For technical issues and general inquiries, visit the XQ Help Center.
Where is the management portal?
The XQ Zero Trust Data Protection Platform management portal is available at https://manage.xqmsg.com/.
Where can I find the community forum?
XQ maintains a community forum at https://community.xqmsg.com/ for user discussions and support.
Blog and Resources
What topics does XQ cover in their blog?
Recent blog articles cover:
Data Sovereignty Governance for Secure Cloud Adoption
How Zero Trust Data Meets IEC 62443 Regulations
Ransomware Protection and Zero Trust Data Security
Enhancing Microsoft Purview with XQ's Platform
AI Analytics for Government & Defense
Industrial Security and the Purdue Model
Cybersecurity Gap Analysis in Data Protection
Creating Zero Trust Data Privacy and Security Programs
Where can I access XQ's blog?
The XQ blog is available at https://xqmsg.co/xq-blog.
Contact and Social Media
How can I contact XQ?
Website Contact: https://xqmsg.co/contact-us
Help Center: https://community.xqmsg.com
LinkedIn: https://www.linkedin.com/company/xqmsg
Twitter/X: https://x.com/xqmsg
Instagram: https://www.instagram.com/xqamerica/
What can I learn during a contact inquiry?
When contacting XQ, you can:
Learn how to protect your data, team, and customers
Get pricing information
Explore use cases specific to your industry
Platform Integration and Deployment
What cloud platforms does XQ integrate with?
AWS (with special Zero Trust Government Partnership)
Microsoft Azure (including Azure Blob storage)
Amazon S3 storage
Can XQ replace existing security solutions?
XQ can serve as a VPN replacement and enhance existing security infrastructure rather than requiring complete replacement. It integrates with existing systems to add Zero Trust Data capabilities.
Is XQ quantum-resistant?
Yes, XQ offers quantum-resistant encryption capabilities, particularly in their Vault solution for long-term data protection.
Data Protection Capabilities
What types of data can XQ protect?
Email communications
File sharing and storage
Database records
Form data
Cloud storage contents
Any digital data asset across hybrid environments
How does XQ monitor data usage?
XQ provides:
Real-time monitoring of data access and movement
Secure chain of custody tracking
Data provenance and residency reporting
Compliance reporting across all environments
What makes XQ's approach unique?
XQ's unique differentiators include:
Record-level data rights management
Geographic access controls (geo-fencing)
Remote data access control ("control leash")
Zero knowledge encryption where even cloud providers cannot access data
Unified platform combining multiple security and compliance functions