The most ubiquitous threat to cloud data at rest and in flight is the period when security keys are memory resident on the host server. Cyphre’s patent pending BlackTIE® technology augments vulnerable single encryption keys with hardware-encrypted Black Keys to render hijacked keys useless, thus nullifying the threat. Chip-resident Black Keys are completely isolated from hacker exposure, and in fact even from Cyphre. For more heightened security, BlackTIE® uses a key per file protection approach to encrypting all data at-rest.
Cyphre’s BlackTIE® technology leverages a data protection appliance based on NXP Semiconductor’s QorIQ processor, which is used extensively by the U.S. military and intelligence services. Hardware-driven encryption protects enterprise data even if hackers access the server, neutralizing a common breach technique that targets software-only security. A browser-based interface along with desktop and mobile applications offer an intuitive user experience that maximizes productivity and collaboration.
Cyphre’s enterprise-class encrypted file sync and share capability enables secure cloud-based collaboration at the individual, group, and enterprise levels. Users are able to access, store, share, and organize files from any device, while adhering to the organization’s control and compliance standards.
The Cyphre Encryption Gateway (CEG) leverages Cyphre’s BlackTIE® encryption technology to protect today’s enterprises as they make use of an array of hybrid cloud services. Through the use of CEG, enterprises can extend a diverse set of cloud services to their users while also resting assured that these services are adhering to a standard set of policies and protections determined by the enterprise. Cyphre’s CEG provides advanced encryption protections for any data resting in an array of public cloud storage and other critical applications while encrypting in accordance with enterprise security policies. The Cyphre Encryption Gateway provides highly advanced and unassailable protections for the generation, access, and use of encryption keys used in the encryption and protection of data at rest in the cloud as well as data in transit between cloud and enterprise access points. Cyphre’s CEG product can best be defined from an industry perspective as a Cloud Access Security Broker (CASB). CEG can be provided in dedicated enterprise premised based solutions as well as a range of CSaaS (Cloud Security as a Service) based solutions.
Internet of Things (IoT) device offerings are expanding at unprecedented rates. Many of these are generating or acquiring sensitive data that is vulnerable to piracy in the cloud. With Cyphre, IoT devices incorporate BlackTIE® encryption technology to securely store and manage cloud data.