SlideShare uma empresa Scribd logo
1 de 2
IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

"Data Integrity in the Big Data Digital Age" gives data its proof in court.

San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by
IDC examines one of the major obstacles organizations face when committing resources and
applications to cloud computing. At stake is the issue of validating the integrity and authenticity of
data within a cloud environment.

"When the data is hosted onsite, this process of data integrity can certainly be a challenge.
However, when data is not hosted within the traditional internal IT data center environment, there
needs to be a method of ensuring indisputable data integrity," cites the report.

Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data
phenomenon with cloud computing, making a case for how organizations must grapple with
analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the
authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data
source legitimate? How can indisputable proof be offered that data integrity remains intact? And
in cases that involve the legal system, how to bring documents, log files, or audio files to the level
where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT
security matters. Few options exist today that can achieve tamper-proof data security outside of
the reliance on third-party certification authorities, or the unwieldy management of a public key
infrastructure. What’s required is a way to validate, verify, and self-authenticate the data
independently of any third-party agency.

Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling
case for the adoption of Keyless Signatures, explaining how the mathematically-driven system
works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and
integrity for electronic data.

"The goal of the keyless signature technology is to provide mass-scale, non-expiring data
validation while eliminating the need for secrets or other forms of trust, thereby reducing or even
eliminating the need for more complex certificate-based solutions, as these are ripe with
certificate management issues, including expiration and revocation," the paper explains.

"A keyless signature provides an alternative method to key-based technologies by providing proof
and non-repudiation of electronic data using only hash functions for verification. The
implementation of keyless signature is done via a globally distributed machine, taking hash
values of data as inputs and returning keyless signatures that prove the time, integrity, and origin
(machine, organization, individual) of the input data."

"Any client using the keyless signature service can make a request to sign any data item it has
access to; a log file, XML file, office document, database record, SWIFT transaction, FPML
message, eDiscovery productions, etc. In return, the client will receive a keyless signature which
can be stored along side the signed data, within the signed data, or in a repository separate from
the signed data for backup and archival purposes."

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an
organization can automatically detect when and where the data was created or transferred, and if
the data has been tampered with or not. An alert is sent to the customer when an abnormal status
is detected.
In this manner, organizations can assure the integrity of data and confirm the location where data
exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with "The keyless nature of this technology helps reduce the footprint by
removing the need for cipher keys and passwords, which arguably can also be lost or mislaid,
and since the integrity can be validated by the document owners, the ability to leverage the cloud
computing platform places it well for future adoption."

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how
to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin
and that not a single bit of the data has changed since a specific point in time. The verification of
the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted
third party. GuardTime's mission is to change the world to one in which Keyless Signatures are
ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the
Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up
Challenge, honoring the company as one of the world's most promising financial technology start-
ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for
signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA - USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Mais conteúdo relacionado

Mais procurados

Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Edward Bukstel
 

Mais procurados (19)

Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
 
Block chain
Block chainBlock chain
Block chain
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Permissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTSPermissioned v. Permissionless Blockchain 10XTS
Permissioned v. Permissionless Blockchain 10XTS
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
Blockchain in Health Care
Blockchain in Health CareBlockchain in Health Care
Blockchain in Health Care
 
Blockchain in Insurance 101
Blockchain in Insurance 101Blockchain in Insurance 101
Blockchain in Insurance 101
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
AWIP Pink Innov Blockchain Workshop deck - May 23, 2019
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 
Blockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and HealthcareBlockchain, Predictive Analytics and Healthcare
Blockchain, Predictive Analytics and Healthcare
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?Blockchain- Why, How and Where to use?
Blockchain- Why, How and Where to use?
 
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
Blockchain: A Catalyst for the Next Wave of Progress in the Life Sciences Ind...
 
Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?Is there a Blockchain Future for Healthcare?
Is there a Blockchain Future for Healthcare?
 
Implementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcareImplementing Blockchain applications in healthcare
Implementing Blockchain applications in healthcare
 
Workshop handout for blockchain workshop
Workshop handout for blockchain workshopWorkshop handout for blockchain workshop
Workshop handout for blockchain workshop
 

Destaque

Destaque (13)

Google Doodles 2002
Google Doodles 2002Google Doodles 2002
Google Doodles 2002
 
Faltam apenas 03 dias
Faltam apenas 03 diasFaltam apenas 03 dias
Faltam apenas 03 dias
 
mercator résumé chapitre 19
mercator résumé chapitre 19mercator résumé chapitre 19
mercator résumé chapitre 19
 
PowerPoint Prueba
PowerPoint PruebaPowerPoint Prueba
PowerPoint Prueba
 
Campaña de Iglesia en Singapur
Campaña de Iglesia en SingapurCampaña de Iglesia en Singapur
Campaña de Iglesia en Singapur
 
Turkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in courtTurkey needs less money in politics and less politics in court
Turkey needs less money in politics and less politics in court
 
Blenderbookv01
Blenderbookv01Blenderbookv01
Blenderbookv01
 
sugarsync
sugarsyncsugarsync
sugarsync
 
Puntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruidoPuntos de monitoreo de aire y ruido
Puntos de monitoreo de aire y ruido
 
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
Bei Tongkat Ali handelt es sich um ein Bittereschengewächs. Neben dieser volk...
 
Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014Play Nicely - Exciting Opportunity for 2014
Play Nicely - Exciting Opportunity for 2014
 
Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365Vmware mquinas-virtuales-19365
Vmware mquinas-virtuales-19365
 
Das hotel Singgasana, Makassar
Das hotel Singgasana, MakassarDas hotel Singgasana, Makassar
Das hotel Singgasana, Makassar
 

Semelhante a IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In Town
Kaenan Hertz
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
Joan Ross
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 

Semelhante a IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free (20)

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
Arkibiz Partners with GuardTime to Provide Auditable E-Documents and Records ...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Data provenance - world in 2030
Data provenance -  world in 2030Data provenance -  world in 2030
Data provenance - world in 2030
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Automating trust with new technologies
Automating trust with new technologiesAutomating trust with new technologies
Automating trust with new technologies
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
itapro201606-New Tech In Town
itapro201606-New Tech In Townitapro201606-New Tech In Town
itapro201606-New Tech In Town
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...Information Leakage Prevention Using Public Key Encryption System and Fingerp...
Information Leakage Prevention Using Public Key Encryption System and Fingerp...
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
 

Último

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

  • 1. IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free "Data Integrity in the Big Data Digital Age" gives data its proof in court. San Francisco, CA (USA), Wednesday - April 18th, 2012 -- A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment. "When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity," cites the report. Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data. Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence? These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency. Sponsored by GuardTime ( http://www.guardtime.com ), the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data. "The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation," the paper explains. "A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data." "Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes." By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.
  • 2. In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud. The report concludes with "The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption." The full report can be found here: http://www.guardtime.com/whitepapers About GuardTime: GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime's Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime's mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world's most promising financial technology start- ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data. Press & Media Contact: Victor Cruz, Principal MediaPR.net Inc San Francisco, CA - USA +1 978-594-4134 vcruz@mediapr.net http://www.guardtime.com