XQ Message Logo

How can we help?

FAQ

What is XQ Message?
XQ is a data‑centric Zero Trust security and governance platform that protects sensitive data at the data layer itself—independent of network location, application, cloud provider, or endpoint. XQ enforces encryption, access control, policy, and audit directly on the data, ensuring that data remains protected even when it moves, is shared, or is stored across untrusted environments.

Unlike perimeter‑based or identity‑only security models, XQ assumes breach and enforces continuous, policy‑driven control over data access and use.
What is XQ’s mission?
XQ’s mission is to safeguard data everywhere, empowering businesses to drive agility and innovation while protecting their reputation, customer trust, and compliance. They aim to make data self-defending across all environments while simplifying compliance and reducing risk.
What are XQ’s core values?
* Making Data Security Easier: XQ’s platform simplifies the job of protecting data
* Automate Governance: XQ automates understanding what data an organization has and who can access it
What is XQ’s vision?
XQ envisions a world where businesses can innovate without compromising security, powered by a platform that enables real-time data classification and protection.
What is Zero Trust Data?
Zero Trust Data is XQ’s approach to data security that assumes no implicit trust and continuously validates every transaction. It unifies security and compliance across environments with the ability to switch data access on and off remotely with a “control leash” to automatically stop cyber attacks and provide compliance.
What are the main components of XQ’s platform?
Data Access Governance (DAG): Real-time data governance controls
Sovereign Data Access Control (DAC): Record-level and geo-access controls
Sensitive Data Discovery & Traceability: Secure chain of custody monitoring
Data Loss Prevention (DLP): Control leash enforced by zero trust data encryption
What environments does XQ protect?
XQ protects data across:
Cloud environments
Edge systems
Hybrid infrastructures
Email systems
Databases
File sharing platforms
VPN replacement solutions
Disconnected Environments
IOT
What is Data Rights Management?
XQ provides Data Rights Management at the record level everywhere data goes, with 74% improvement in data control capabilities through attribute-based tagging, role-based access control, encryption, and geo-restriction in one unified platform.
How does XQ’s encryption work?
XQ uses zero knowledge encryption where even cloud-managed services cannot access data secured by XQ. Local key custodians within each jurisdiction enforce geofenced access, ensuring sensitive data is only available within authorized regions.
What is Attribute-Based Access Control (ABAC)?
Attribute-Based Access Control (ABAC) determines access to data based on the contents , tags, classification and environment of the data itself. ABAC and Data Rights Management at the record level helps maintain Context-Based Access Control and Compliance, providing traceability and secure chain of custody from the source.
What is XQ’s “control leash”?
The control leash is XQ’s remote enforcement capability that allows organizations to switch data access on and off remotely, automatically stopping cyber attacks and ensuring compliance through zero knowledge encryption and policies for each individual data object.
What compliance standards does XQ support?
CMMC (Cybersecurity Maturity Model Certification)
GDPR (General Data Protection Regulation)
HIPAA (Health Insurance Portability and Accountability Act)
FINRA (Financial Industry Regulatory Authority)
ITAR (International Traffic in Arms Regulations)
IEC 62443 (Industrial cybersecurity standards)
Zero Trust
NIST
CJIS
APC 240
ITAR
How does XQ help with CMMC certification?
XQ enables CMMC certification without requiring organizations to move to GCC High (Government Community Cloud High). The platform provides the necessary data protection and compliance controls while maintaining flexibility in cloud deployment.
How does XQ ensure GDPR compliance?
XQ prevents GDPR infractions and fines by:
Restricting all 3rd party data access and exfiltration to non-GDPR compliant regions
Enabling clients to encrypt all cloud data while storing keys within on-premises European infrastructure
Ensuring data cannot be accessed by US authorities via subpoena without client knowledge and consent
Leveraging global data localization requirements per the SHREMS II ruling
What is XQ’s approach to data sovereignty?
XQ provides cloud-managed services that cannot access secured data, with local key custodians within each jurisdiction enforcing geofenced access. This ensures sensitive data remains only within authorized regions and prevents unauthorized international data transfers.
What is XQ’s relationship with AWS?
XQ is part of AWS’s Zero Trust for Government Partnership (ZTAG). The solution aligns to the NIST Zero Trust Framework with XQ fulfilling the Zero Trust Data component specifically for government applications.
What industries does XQ serve?
Government and Defense
Healthcare (HIPAA compliance)
Financial Services (FINRA compliance)
Industrial/Manufacturing (IEC 62443)
Education
Any organization requiring GDPR compliance
How does XQ protect against ransomware?
XQ protects files from ransomware extortion through its Zero Trust Data Security approach, preventing insider threat data exfiltration and stopping what they call the “Snowden Effect” of unauthorized data access. By separating data and network control XQ allows for remote access control of data. This remote access control allows exfiltrated data tyo be turned into ‘digital dust’, removing the attackers ability to extort the victim.
How does XQ enhance Microsoft Purview?
Integrating XQ’s Zero Trust Data Platform significantly enhances Microsoft Purview’s capabilities by adding advanced data protection, encryption, and access control features.
What is the XQ Vault solution?
XQ Vault is a quantum-resistant file storage solution that works with S3 and Azure Blob storage, providing enhanced security for data analytics, particularly in government and defense applications.
Where is the management portal?
The XQ Zero Trust Data Protection Platform management portal is available at https://manage.xqmsg.com/.
What topics does XQ cover in their blog?
Recent blog articles cover:
Data Sovereignty Governance for Secure Cloud Adoption
How Zero Trust Data Meets IEC 62443 Regulations
Ransomware Protection and Zero Trust Data Security
Enhancing Microsoft Purview with XQ’s Platform
AI Analytics for Government & Defense
Industrial Security and the Purdue Model
Cybersecurity Gap Analysis in Data Protection
Creating Zero Trust Data Privacy and Security Programs
Where can I access XQ’s blog?
The XQ blog is available at https://xqmsg.co/xq-blog.
How can I contact XQ?
What cloud platforms does XQ integrate with?
AWS
Microsoft Azure (including Azure Blob storage)
Google
Linux
Can XQ replace existing security solutions?
XQ can serve as a VPN replacement and enhance existing security infrastructure rather than requiring complete replacement. XQ replaces software in many categories.

Estimated Annual Savings
Compliance Zero Trust, NIST, HIPAA, ITAR
$1.5M – $6.5M
Data Loss Prevention
$1M – $3.3M
Files Security and Governance
$325K – $910K
Database Security
$400K–$1.1M+
Migration
$100K–$300K
Ransomware Protection
$1.5 – $4.8M
Data Sovereignty
$520K – $1.68M
Is XQ quantum-resistant?
Yes, XQ offers quantum-resistant encryption capabilities, particularly in their Vault solution for long-term data protection.
What types of data can XQ protect?
Email communications
File sharing and storage
Database records
Form data
IoT Data
Snowflake Data
Datalake data
Satellite data
Cloud storage contents
Any digital data asset across hybrid environments
How does XQ monitor data usage?
XQ provides:
Real-time monitoring of data access and movement
Secure chain of custody tracking
Data provenance and residency reporting
Compliance reporting across all environments
What makes XQ’s approach unique?
XQ’s unique differentiators include:
Record-level data rights management
Geographic access controls (geo-fencing)
Remote data access control (“control leash”)
Zero knowledge encryption where even cloud providers cannot access data
Unified platform combining multiple security and compliance functions
What problem does XQ solve?
Organizations struggle to securely share and govern sensitive data across:
Multi‑cloud and hybrid environments
Third‑party vendors and contractors
BYOD and unmanaged devices
Disconnected, edge, and tactical environments
AI, analytics, and data fabric architectures
Traditional tools (DLP, IAM, CASB, network segmentation) do not travel with the data. Once data leaves a trusted boundary, security and governance are lost.
XQ solves this by making the data itself the control plane.
How is XQ different from encryption at rest or in transit?
Standard encryption protects data only:
At rest (storage‑level encryption)
In transit (TLS)
Once decrypted for use, data is exposed.
XQ provides persistent, object‑level encryption with:
Externalized key management
Policy‑based decryption
Continuous access validation
Real‑time revocation
Data remains encrypted before, during, and after use, and access is granted only when policy conditions are met.
What is Zero Trust Data Security?
Zero Trust Data Security applies Zero Trust principles directly to data:
Never trust implicit access
Always verify context and policy
Enforce least privilege at the data layer
Assume breach at all times
XQ operationalizes the DoD Zero Trust Data Pillar by enforcing security, governance, and audit at the data object level rather than relying on perimeter controls.
How does XQ protect databases?
XQ provides Zero Trust, data-layer protection for structured data and databases, enforcing security directly on database records, tables, or objects rather than relying solely on perimeter controls, network segmentation, or database-native security features.
Key database protection capabilities include:
Persistent Encryption at the Data Layer
Data is encrypted before being written to the database
Encryption persists outside the database engine
Stolen backups, replicas, or exports remain unreadable
Externalized Key Management
Encryption keys are never stored with the data
Customer-controlled or sovereign key stores
Immediate access revocation without data migration
Policy-Based Access Control
Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC)
Policies enforced at query, record, or object level
Context-aware decisions (user, role, purpose, location, device, mission)
Zero Trust for Analytics and Queries
No implicit trust for applications, users, or services
Continuous validation for every access request
Works with analytics engines, data warehouses, and BI tools
Protection Across Database Types
XQ supports database protection for:
Relational databases (PostgreSQL, MySQL, SQL Server, Oracle)
Cloud-native databases and warehouses
Distributed and federated data architectures
Data fabrics and data mesh environments
Compliance-Ready Database Security
XQ helps organizations meet database-related compliance requirements including:
NIST 800-53 / 800-171 controls for data protection
DoD Zero Trust Data Pillar requirements
HIPAA safeguards for PHI
GDPR data minimization and access control
PCI DSS protection of cardholder data
Secure Database Sharing and Replication
Safe sharing with third parties and contractors
Controlled access to replicas and read-only datasets
Protection for cross-border and multi-cloud deployments
By enforcing security at the data object level, XQ ensures databases remain protected even when credentials are compromised, perimeter defenses fail, or data is copied outside approved systems.
What industries use XQ?
XQ supports highly regulated and data‑sensitive industries, including:
Financial Services
PCI DSS and GLBA compliance
Secure client communications
Fraud‑resistant data sharing
Vendor and partner access control
Healthcare & Life Sciences
HIPAA and HITECH compliance
Patient data sharing across providers
Secure research collaboration
Genomics and medical device data protection
Right to Be Forgotten enforcement
Energy, Utilities & Critical Infrastructure
XQ enables secure data sharing and governance across highly distributed, operationally sensitive energy environments.
Key use cases include:
Protection of OT, SCADA, and sensor data
Secure IT/OT data exchange without expanding attack surfaces
Controlled sharing with regulators, suppliers, and service providers
Data sovereignty for cross-border energy operations
Resilience for disconnected, remote, and field-based systems
Government & Defense
Controlled Unclassified Information (CUI)
Classified and coalition data sharing
Disconnected and tactical environments
DoD Zero Trust Architecture alignment
IL4/IL5/IL6 cloud environments