SlideShare uma empresa Scribd logo
1 de 18
1 ConfidentialSecure Cloud Systems, Inc.
CertainSafe®, Inc.
Digital Vault Technology
Technology Overview
May 2016
© CertainSafe, Inc.
2 ConfidentialSecure Cloud Systems, Inc.
CertainSafe (CSI) Digital Vault Technology
• Replaces sensitive data with unique MicroTokens®
• MicroTokens are similar to Credit Card tokens
• MicroTokens do not use ant part of the original data in their creation
• Credit card tokens are limited to 16 characters / letters/digits
Ultra secure cybersecurity solutions to protect digital information exploitation
Intro to the Digital Vault
© CertainSafe, Inc
3 ConfidentialSecure Cloud Systems, Inc.
CertainSafe® (CSI) Digital Vault Technology
• MicroTokens convert up to 2 GB of a single data instance
(2 GB = 16 billion bits ) including but not limited to data files
• CertainSafe Digital Vault engine can create 60+ million MicroTokens per
minute
• It’s architecture, built modular in design, stands ready to meet expansive
growth demands as required, by specific need
Intro to the Digital Vault
Protection again traditional data breach exploitation when perimeter defenses are compromised
© CertainSafe, Inc
4 ConfidentialSecure Cloud Systems, Inc.
The Internet Was Not Designed For Security
• Every device is open to malicious attack
• Each access point provides an additional opportunity for a
security breach to occur
• Current architectures provide vulnerabilities that create
potential mass data breach threats
Challenge
“We didn’t focus on how you could wreck this system intentionally” - Vince G. Cerf VP/ Chief Evangelist for Google.
© CertainSafe, Inc
5 ConfidentialSecure Cloud Systems, Inc.
The Internet Was Not Designed For Security
• These threats can be mitigated with the deployment of
MicroTokenization
• Large-scale “Cloud” ecosystems must be secured
• Local Intranet installations containing sensitive data will
not be safe until security can be assured
Challenge
Privacy and security has been “bolted on” – Quoted by Mikko Hyppönen (CRO at F-Secure )
© CertainSafe, Inc
6 ConfidentialSecure Cloud Systems, Inc.
• Ponemon Institute - 43 % of companies experienced
a data breach in 2014
• Symantec 2015 - Zero-day vulnerabilities more
than doubled to 54, a 125 %
increase from the year before
• 9 “Mega-Breaches”- Reported number of exposed
identities soared to
429,000,000 (429 million).
• Unreported 2015 - Conservative estimate of
records lost now more than half
a billion (500,000,000).
Data Breaches Continue to Increase Exponentially Year Over Year
From 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019
Opportunity
© CertainSafe, Inc
7 ConfidentialSecure Cloud Systems, Inc.
• Networked and connected devices/systems can be uniquely
protected and secured
• Sensitive data no longer remains on devices as it is replaced
with MicroTokens as placeholders
• End-to-End Encryption schema is provided for data in motion
as well as data at rest
The Cyber-Security Paradigm - MicroTokenization®
Sensitive data is removed from existing systems therefore mitigating the threat of external exploitation when a breach occurs
Solution
© CertainSafe, Inc
8 ConfidentialSecure Cloud Systems, Inc.
• Helps prevent man-in-the-middle attacks with added
credentialing
• Provides the capability to string together proprietary business
rules for accessibility
• Compatible with existing firewalls, ID management, secure
network protocols , encryption algorithms
• Compliments existing security investments
The Cyber-Security Paradigm - MicroTokenization®
Agnostic to the form of data that’s requires additional protection
Solution
© CertainSafe, Inc
9 ConfidentialSecure Cloud Systems, Inc.
• Advanced data-centric platform beyond PCI
DSS Level 1 standards
• MTE engine that’s extremely configurable
• MicroTokens, ensure levels of security
unattainable with traditional network defenses
• Combines with client preferred algorithms
addicting additional protection
Technology Overview
SaaS – Security as a Service Taking Shape
MicroTokenized / MicroEncrypted data can be protected and potentially eliminate possible mass data breach attacks
© CertainSafe, Inc
10 ConfidentialSecure Cloud Systems, Inc.
MicroTokenization adds comprehensive cyber protection within existing legacy systems as well as newly created platforms.
Technical Overview
Existing Systems Can be Updated – Enhance Rather Than Replace
• Upgrading your security doesn't require changing your system.
• Gain PFI and HIPPA compliant level security while preserving real-time
data access within existing platforms
• Agnostic to the type of data requiring protection
• API Library allows configurable access to the platform
• Comprehensive, self-service SDK (Software Development Kit)
• Customized solutions
© CertainSafe, Inc
11 ConfidentialSecure Cloud Systems, Inc.
Security is everywhere
The Multiple Layers of MicroTokenization Enhance Security
A host of techniques are deployed in conjunction with the already ultra-secure CertainSafe tokenization and Encryption processes
• Every single piece of digital data is protected and encrypted individually
• Every piece of encrypted digital data is assigned its’ own proprietary set
of access keys
• Original sensitive data is completely removed from clients systems
o In the event of a breach only useless MicroTokens are exposed
MicroEncryption® breaks the encrypted data into
smaller bits and scatters them across multiple hard drives
CertainSafe
Server System
© CertainSafe, Inc
12 ConfidentialSecure Cloud Systems, Inc.
CertainSafe Payment Services
Protects payment information from hackers is vital in today's digital age.
• CertainSafe Payment Services can either replace, our continue to work with a
clients’ current payment Processor/ Gateway provider
• Secures and stores all payment information - Not just the credit card number
- Up to 2GB /field/file
• Payment instructions and business rules securely stored for recurring
processing an analytics
E-Commerce Protection
®
© CertainSafe, Inc
13 ConfidentialSecure Cloud Systems, Inc.
MICROTOKENIZATION
LIVEDEMONSTRATION
• CertainSafe offers a Security as a Service SDK
(software development kit) providing Developers
access to its award-winning MicroTokenization® and
MicroEncryption®
• Simple, cost effective approach to secure system and
application data at a level never before thought
possible.
MicroTokens are created before your eyes and then
stored in CertainSafe’s Digital Vault in Real-Time
(Available upon request)
Live Tokenization Demo
MicroTokenization
of
Files
MicroTokenization
of
Text
© CertainSafe, Inc
14 ConfidentialSecure Cloud Systems, Inc.
Level 1
Personally Identifiable
Information
C
CERTIFIED SECURITY FORCOMPLIANCE
Cyber security compliance failures can lead to big losses.
Compliancy Requirements
© CertainSafe, Inc
15 ConfidentialSecure Cloud Systems, Inc.
AWARD WINNING CYBER PROTECTION
2014
Award Winner
2014 Technical
Excellence Award
2014 – 2015 - 2016
Editor’s Choice Award
15
• American Business Awards 2014
“Stevie” for Cloud Security
• PC Magazine – Editor’s Choice Award
• 2014
• 2015
• 2016
• PC Magazine Technical Excellence
Award for Best Cyber Security
Award Recognition
Confidential © CertainSafe, Inc
16 ConfidentialSecure Cloud Systems, Inc.
16
• Must ensure only the right people get access to the right
information at the right time
• Requires trusted, self-sufficient secured data, backed by
technology that outperforms current standards
• It must ensure the security of sensitive data in the
“Likely” event of a perimeter defense breach.
A New Security Paradigm Is Required
Change Is Required
© CertainSafe, Inc
17 ConfidentialSecure Cloud Systems, Inc.
17
• It is essential that digital Intellectual property remains
private and protected regardless of the type of attack
• full assurance that information remains protected by
trustworthy security measures and unavailable to
exploitation
A New Security Paradigm Is Required
MicroTokenization and MicroEncryption capabilities
ensure that sensitive data remains unavailable to
exploitation even in the event of traditional network
defense breach
CertainSafe Is The New Paradigm
Change Is Required
© CertainSafe, Inc
18 ConfidentialSecure Cloud Systems, Inc.
For more information contact:
Steven Russo, President / srusso@certainsafe.com
Office: 719-323-6680 X 120
© CertainSafe, Inc

Mais conteúdo relacionado

Mais procurados

Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewRobert Herjavec
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysMarcel Winandy
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingRobert Herjavec
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxAccuKnox
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Sean Xie
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 

Mais procurados (20)

Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
LIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud ComputingLIFT OFF 2017: AWS and Cloud Computing
LIFT OFF 2017: AWS and Cloud Computing
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019Palo Alto Networks Portfolio & Strategy Overview 2019
Palo Alto Networks Portfolio & Strategy Overview 2019
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 

Destaque

Informática práctica presentación
Informática práctica presentación Informática práctica presentación
Informática práctica presentación Daniela Maldonado
 
Looking to hire awesome people
Looking to hire awesome peopleLooking to hire awesome people
Looking to hire awesome peopleBarry Newlin
 
Interpretasi
InterpretasiInterpretasi
InterpretasiMir ra
 
Zealous for the house john 2.12 17
Zealous for the house john 2.12 17Zealous for the house john 2.12 17
Zealous for the house john 2.12 17Unfailinglove
 
Getting to Know Jesus The prerogative of the savior
 Getting to Know Jesus The prerogative of the savior Getting to Know Jesus The prerogative of the savior
Getting to Know Jesus The prerogative of the saviorUnfailinglove
 
C lculo de ca¡da de tensi¢n en conductores de bt
C lculo de ca¡da de tensi¢n en conductores de btC lculo de ca¡da de tensi¢n en conductores de bt
C lculo de ca¡da de tensi¢n en conductores de btluis vasquez hernandez
 
A Framework for Improving e-Services Utilization in Rural Areas
A Framework for Improving e-Services Utilization in Rural AreasA Framework for Improving e-Services Utilization in Rural Areas
A Framework for Improving e-Services Utilization in Rural AreasSocial_worker_india
 
Ashot education and consultancy services (Pvt) Ltd
Ashot education and consultancy services (Pvt) LtdAshot education and consultancy services (Pvt) Ltd
Ashot education and consultancy services (Pvt) LtdASHOT Group
 
Powerpoint ftw
Powerpoint ftwPowerpoint ftw
Powerpoint ftwMel A
 
Seguridad en los centros de cómputo
Seguridad en los centros de cómputoSeguridad en los centros de cómputo
Seguridad en los centros de cómputoVicky Salinas Méndez
 
Gratefulness is the key
Gratefulness is the keyGratefulness is the key
Gratefulness is the keyUnfailinglove
 
First encounter john 1.43 51
First  encounter john 1.43 51First  encounter john 1.43 51
First encounter john 1.43 51Unfailinglove
 
10 pasos hacia la madurez y realización personal
10 pasos hacia la madurez y realización personal10 pasos hacia la madurez y realización personal
10 pasos hacia la madurez y realización personalVicky Salinas Méndez
 
RESUME (ABDUSSALAM MUHIYDEEN) (3)
RESUME (ABDUSSALAM MUHIYDEEN) (3)RESUME (ABDUSSALAM MUHIYDEEN) (3)
RESUME (ABDUSSALAM MUHIYDEEN) (3)olajide Abdussalam
 

Destaque (20)

Informática práctica presentación
Informática práctica presentación Informática práctica presentación
Informática práctica presentación
 
Looking to hire awesome people
Looking to hire awesome peopleLooking to hire awesome people
Looking to hire awesome people
 
Interpretasi
InterpretasiInterpretasi
Interpretasi
 
Verbal phrase karina
Verbal phrase karinaVerbal phrase karina
Verbal phrase karina
 
Zealous for the house john 2.12 17
Zealous for the house john 2.12 17Zealous for the house john 2.12 17
Zealous for the house john 2.12 17
 
Revitalize your theme park
Revitalize your theme parkRevitalize your theme park
Revitalize your theme park
 
Getting to Know Jesus The prerogative of the savior
 Getting to Know Jesus The prerogative of the savior Getting to Know Jesus The prerogative of the savior
Getting to Know Jesus The prerogative of the savior
 
C lculo de ca¡da de tensi¢n en conductores de bt
C lculo de ca¡da de tensi¢n en conductores de btC lculo de ca¡da de tensi¢n en conductores de bt
C lculo de ca¡da de tensi¢n en conductores de bt
 
A Framework for Improving e-Services Utilization in Rural Areas
A Framework for Improving e-Services Utilization in Rural AreasA Framework for Improving e-Services Utilization in Rural Areas
A Framework for Improving e-Services Utilization in Rural Areas
 
Ashot education and consultancy services (Pvt) Ltd
Ashot education and consultancy services (Pvt) LtdAshot education and consultancy services (Pvt) Ltd
Ashot education and consultancy services (Pvt) Ltd
 
Powerpoint ftw
Powerpoint ftwPowerpoint ftw
Powerpoint ftw
 
The Hurt Locker
The Hurt LockerThe Hurt Locker
The Hurt Locker
 
Seguridad en los centros de cómputo
Seguridad en los centros de cómputoSeguridad en los centros de cómputo
Seguridad en los centros de cómputo
 
DOL Platform
DOL PlatformDOL Platform
DOL Platform
 
Gratefulness is the key
Gratefulness is the keyGratefulness is the key
Gratefulness is the key
 
First encounter john 1.43 51
First  encounter john 1.43 51First  encounter john 1.43 51
First encounter john 1.43 51
 
Como ser mas productivo
Como ser mas productivoComo ser mas productivo
Como ser mas productivo
 
Curriculum Vitae
Curriculum VitaeCurriculum Vitae
Curriculum Vitae
 
10 pasos hacia la madurez y realización personal
10 pasos hacia la madurez y realización personal10 pasos hacia la madurez y realización personal
10 pasos hacia la madurez y realización personal
 
RESUME (ABDUSSALAM MUHIYDEEN) (3)
RESUME (ABDUSSALAM MUHIYDEEN) (3)RESUME (ABDUSSALAM MUHIYDEEN) (3)
RESUME (ABDUSSALAM MUHIYDEEN) (3)
 

Semelhante a CertainSafe MicroTokenization Technology Detailed Overview

Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdflangkahgontay88
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
IBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIsabel Sanz
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMLuigi Perrone
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureBlock Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour BrochureFloyd DCosta
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deckRichard Blech
 

Semelhante a CertainSafe MicroTokenization Technology Detailed Overview (20)

Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
IBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIBM Cloud Data Encryption Services
IBM Cloud Data Encryption Services
 
Come gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLMCome gestire l'encryption dei dati con SKLM
Come gestire l'encryption dei dati con SKLM
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Secure channels main deck
Secure channels main deckSecure channels main deck
Secure channels main deck
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

CertainSafe MicroTokenization Technology Detailed Overview

  • 1. 1 ConfidentialSecure Cloud Systems, Inc. CertainSafe®, Inc. Digital Vault Technology Technology Overview May 2016 © CertainSafe, Inc.
  • 2. 2 ConfidentialSecure Cloud Systems, Inc. CertainSafe (CSI) Digital Vault Technology • Replaces sensitive data with unique MicroTokens® • MicroTokens are similar to Credit Card tokens • MicroTokens do not use ant part of the original data in their creation • Credit card tokens are limited to 16 characters / letters/digits Ultra secure cybersecurity solutions to protect digital information exploitation Intro to the Digital Vault © CertainSafe, Inc
  • 3. 3 ConfidentialSecure Cloud Systems, Inc. CertainSafe® (CSI) Digital Vault Technology • MicroTokens convert up to 2 GB of a single data instance (2 GB = 16 billion bits ) including but not limited to data files • CertainSafe Digital Vault engine can create 60+ million MicroTokens per minute • It’s architecture, built modular in design, stands ready to meet expansive growth demands as required, by specific need Intro to the Digital Vault Protection again traditional data breach exploitation when perimeter defenses are compromised © CertainSafe, Inc
  • 4. 4 ConfidentialSecure Cloud Systems, Inc. The Internet Was Not Designed For Security • Every device is open to malicious attack • Each access point provides an additional opportunity for a security breach to occur • Current architectures provide vulnerabilities that create potential mass data breach threats Challenge “We didn’t focus on how you could wreck this system intentionally” - Vince G. Cerf VP/ Chief Evangelist for Google. © CertainSafe, Inc
  • 5. 5 ConfidentialSecure Cloud Systems, Inc. The Internet Was Not Designed For Security • These threats can be mitigated with the deployment of MicroTokenization • Large-scale “Cloud” ecosystems must be secured • Local Intranet installations containing sensitive data will not be safe until security can be assured Challenge Privacy and security has been “bolted on” – Quoted by Mikko Hyppönen (CRO at F-Secure ) © CertainSafe, Inc
  • 6. 6 ConfidentialSecure Cloud Systems, Inc. • Ponemon Institute - 43 % of companies experienced a data breach in 2014 • Symantec 2015 - Zero-day vulnerabilities more than doubled to 54, a 125 % increase from the year before • 9 “Mega-Breaches”- Reported number of exposed identities soared to 429,000,000 (429 million). • Unreported 2015 - Conservative estimate of records lost now more than half a billion (500,000,000). Data Breaches Continue to Increase Exponentially Year Over Year From 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019 Opportunity © CertainSafe, Inc
  • 7. 7 ConfidentialSecure Cloud Systems, Inc. • Networked and connected devices/systems can be uniquely protected and secured • Sensitive data no longer remains on devices as it is replaced with MicroTokens as placeholders • End-to-End Encryption schema is provided for data in motion as well as data at rest The Cyber-Security Paradigm - MicroTokenization® Sensitive data is removed from existing systems therefore mitigating the threat of external exploitation when a breach occurs Solution © CertainSafe, Inc
  • 8. 8 ConfidentialSecure Cloud Systems, Inc. • Helps prevent man-in-the-middle attacks with added credentialing • Provides the capability to string together proprietary business rules for accessibility • Compatible with existing firewalls, ID management, secure network protocols , encryption algorithms • Compliments existing security investments The Cyber-Security Paradigm - MicroTokenization® Agnostic to the form of data that’s requires additional protection Solution © CertainSafe, Inc
  • 9. 9 ConfidentialSecure Cloud Systems, Inc. • Advanced data-centric platform beyond PCI DSS Level 1 standards • MTE engine that’s extremely configurable • MicroTokens, ensure levels of security unattainable with traditional network defenses • Combines with client preferred algorithms addicting additional protection Technology Overview SaaS – Security as a Service Taking Shape MicroTokenized / MicroEncrypted data can be protected and potentially eliminate possible mass data breach attacks © CertainSafe, Inc
  • 10. 10 ConfidentialSecure Cloud Systems, Inc. MicroTokenization adds comprehensive cyber protection within existing legacy systems as well as newly created platforms. Technical Overview Existing Systems Can be Updated – Enhance Rather Than Replace • Upgrading your security doesn't require changing your system. • Gain PFI and HIPPA compliant level security while preserving real-time data access within existing platforms • Agnostic to the type of data requiring protection • API Library allows configurable access to the platform • Comprehensive, self-service SDK (Software Development Kit) • Customized solutions © CertainSafe, Inc
  • 11. 11 ConfidentialSecure Cloud Systems, Inc. Security is everywhere The Multiple Layers of MicroTokenization Enhance Security A host of techniques are deployed in conjunction with the already ultra-secure CertainSafe tokenization and Encryption processes • Every single piece of digital data is protected and encrypted individually • Every piece of encrypted digital data is assigned its’ own proprietary set of access keys • Original sensitive data is completely removed from clients systems o In the event of a breach only useless MicroTokens are exposed MicroEncryption® breaks the encrypted data into smaller bits and scatters them across multiple hard drives CertainSafe Server System © CertainSafe, Inc
  • 12. 12 ConfidentialSecure Cloud Systems, Inc. CertainSafe Payment Services Protects payment information from hackers is vital in today's digital age. • CertainSafe Payment Services can either replace, our continue to work with a clients’ current payment Processor/ Gateway provider • Secures and stores all payment information - Not just the credit card number - Up to 2GB /field/file • Payment instructions and business rules securely stored for recurring processing an analytics E-Commerce Protection ® © CertainSafe, Inc
  • 13. 13 ConfidentialSecure Cloud Systems, Inc. MICROTOKENIZATION LIVEDEMONSTRATION • CertainSafe offers a Security as a Service SDK (software development kit) providing Developers access to its award-winning MicroTokenization® and MicroEncryption® • Simple, cost effective approach to secure system and application data at a level never before thought possible. MicroTokens are created before your eyes and then stored in CertainSafe’s Digital Vault in Real-Time (Available upon request) Live Tokenization Demo MicroTokenization of Files MicroTokenization of Text © CertainSafe, Inc
  • 14. 14 ConfidentialSecure Cloud Systems, Inc. Level 1 Personally Identifiable Information C CERTIFIED SECURITY FORCOMPLIANCE Cyber security compliance failures can lead to big losses. Compliancy Requirements © CertainSafe, Inc
  • 15. 15 ConfidentialSecure Cloud Systems, Inc. AWARD WINNING CYBER PROTECTION 2014 Award Winner 2014 Technical Excellence Award 2014 – 2015 - 2016 Editor’s Choice Award 15 • American Business Awards 2014 “Stevie” for Cloud Security • PC Magazine – Editor’s Choice Award • 2014 • 2015 • 2016 • PC Magazine Technical Excellence Award for Best Cyber Security Award Recognition Confidential © CertainSafe, Inc
  • 16. 16 ConfidentialSecure Cloud Systems, Inc. 16 • Must ensure only the right people get access to the right information at the right time • Requires trusted, self-sufficient secured data, backed by technology that outperforms current standards • It must ensure the security of sensitive data in the “Likely” event of a perimeter defense breach. A New Security Paradigm Is Required Change Is Required © CertainSafe, Inc
  • 17. 17 ConfidentialSecure Cloud Systems, Inc. 17 • It is essential that digital Intellectual property remains private and protected regardless of the type of attack • full assurance that information remains protected by trustworthy security measures and unavailable to exploitation A New Security Paradigm Is Required MicroTokenization and MicroEncryption capabilities ensure that sensitive data remains unavailable to exploitation even in the event of traditional network defense breach CertainSafe Is The New Paradigm Change Is Required © CertainSafe, Inc
  • 18. 18 ConfidentialSecure Cloud Systems, Inc. For more information contact: Steven Russo, President / srusso@certainsafe.com Office: 719-323-6680 X 120 © CertainSafe, Inc