certainsafe microtokenization technology detailed overview

18
1 Confidenti al Secure Cloud Systems, Inc. CertainSafe®, Inc. Digital Vault Technology Technology Overview May 2016 © CertainSafe, Inc.

Upload: steven-russo

Post on 11-Apr-2017

49 views

Category:

Technology


0 download

TRANSCRIPT

1 ConfidentialSecure Cloud Systems, Inc.

CertainSafe®, Inc. Digital Vault Technology

Technology Overview May 2016

© CertainSafe, Inc.

2 ConfidentialSecure Cloud Systems, Inc.

CertainSafe (CSI) Digital Vault Technology

• Replaces sensitive data with unique MicroTokens®

• MicroTokens are similar to Credit Card tokens

• MicroTokens do not use ant part of the original data in their creation

• Credit card tokens are limited to 16 characters / letters/digits

Ultra secure cybersecurity solutions to protect digital information exploitation

Intro to the Digital Vault

© CertainSafe, Inc

3 ConfidentialSecure Cloud Systems, Inc.

CertainSafe® (CSI) Digital Vault Technology

• MicroTokens convert up to 2 GB of a single data instance (2 GB = 16 billion bits ) including but not limited to data files

• CertainSafe Digital Vault engine can create 60+ million MicroTokens per minute

• It’s architecture, built modular in design, stands ready to meet expansive growth demands as required, by specific need

Intro to the Digital Vault

Protection again traditional data breach exploitation when perimeter defenses are compromised

© CertainSafe, Inc

4 ConfidentialSecure Cloud Systems, Inc.

The Internet Was Not Designed For Security

• Every device is open to malicious attack

• Each access point provides an additional opportunity for a security breach to occur

• Current architectures provide vulnerabilities that create potential mass data breach threats

Challenge

“We didn’t focus on how you could wreck this system intentionally” - Vince G. Cerf VP/ Chief Evangelist for Google.

© CertainSafe, Inc

5 ConfidentialSecure Cloud Systems, Inc.

The Internet Was Not Designed For Security

• These threats can be mitigated with the deployment of MicroTokenization

• Large-scale “Cloud” ecosystems must be secured

• Local Intranet installations containing sensitive data will not be safe until security can be assured

Challenge

Privacy and security has been “bolted on” – Quoted by Mikko Hyppönen (CRO at F-Secure )

© CertainSafe, Inc

6 ConfidentialSecure Cloud Systems, Inc.

• Ponemon Institute - 43 % of companies experienced a data breach in 2014

• Symantec 2015 - Zero-day vulnerabilities more than doubled to 54, a 125 % increase from the year before

• 9 “Mega-Breaches”- Reported number of exposed identities soared to 429,000,000 (429 million).

• Unreported 2015 - Conservative estimate of records lost now more than half a billion (500,000,000).

Data Breaches Continue to Increase Exponentially Year Over YearFrom 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019

Opportunity

© CertainSafe, Inc

7 ConfidentialSecure Cloud Systems, Inc.

• Networked and connected devices/systems can be uniquely protected and secured

• Sensitive data no longer remains on devices as it is replaced with MicroTokens as placeholders

• End-to-End Encryption schema is provided for data in motion as well as data at rest

The Cyber-Security Paradigm - MicroTokenization®

Sensitive data is removed from existing systems therefore mitigating the threat of external exploitation when a breach occurs

Solution

© CertainSafe, Inc

8 ConfidentialSecure Cloud Systems, Inc.

• Helps prevent man-in-the-middle attacks with added credentialing

• Provides the capability to string together proprietary business rules for accessibility

• Compatible with existing firewalls, ID management, secure network protocols , encryption algorithms

• Compliments existing security investments

The Cyber-Security Paradigm - MicroTokenization®

Agnostic to the form of data that’s requires additional protection

Solution

© CertainSafe, Inc

9 ConfidentialSecure Cloud Systems, Inc.

• Advanced data-centric platform beyond PCI DSS Level 1 standards

• MTE engine that’s extremely configurable

• MicroTokens, ensure levels of security unattainable with traditional network defenses

• Combines with client preferred algorithms addicting additional protection

Technology Overview

SaaS – Security as a Service Taking ShapeMicroTokenized / MicroEncrypted data can be protected and potentially eliminate possible mass data breach attacks

© CertainSafe, Inc

10 ConfidentialSecure Cloud Systems, Inc.

MicroTokenization adds comprehensive cyber protection within existing legacy systems as well as newly created platforms.

Technical OverviewExisting Systems Can be Updated – Enhance Rather Than Replace

• Upgrading your security doesn't require changing your system.

• Gain PFI and HIPPA compliant level security while preserving real-time data access within existing platforms

• Agnostic to the type of data requiring protection

• API Library allows configurable access to the platform

• Comprehensive, self-service SDK (Software Development Kit)

• Customized solutions© CertainSafe, Inc

11 ConfidentialSecure Cloud Systems, Inc.

Security is everywhereThe Multiple Layers of MicroTokenization Enhance Security A host of techniques are deployed in conjunction with the already ultra-secure CertainSafe tokenization and Encryption processes

• Every single piece of digital data is protected and encrypted individually

• Every piece of encrypted digital data is assigned its’ own proprietary set of access keys

• Original sensitive data is completely removed from clients systems

o In the event of a breach only useless MicroTokens are exposed

MicroEncryption® breaks the encrypted data into smaller bits and

scatters them across multiple hard drives

CertainSafeServer System

© CertainSafe, Inc

12 ConfidentialSecure Cloud Systems, Inc.

CertainSafe Payment ServicesProtects payment information from hackers is vital in today's digital age.

• CertainSafe Payment Services can either replace, our continue to work with a clients’ current payment Processor/ Gateway provider

• Secures and stores all payment information - Not just the credit card number - Up to 2GB /field/file

• Payment instructions and business rules securely stored for recurring processing an analytics

E-Commerce Protection

®

© CertainSafe, Inc

13 ConfidentialSecure Cloud Systems, Inc.

MICROTOKENIZATION LIVE DEMONSTRATION

• CertainSafe offers a Security as a Service SDK (software development kit) providing Developers access to its award-winning MicroTokenization® and MicroEncryption®

• Simple, cost effective approach to secure system and application data at a level never before thought possible.

MicroTokens are created before your eyes and then stored in CertainSafe’s Digital Vault in Real-Time

(Available upon request)

Live Tokenization Demo

MicroTokenization of

Files

MicroTokenization of

Text

© CertainSafe, Inc

14 ConfidentialSecure Cloud Systems, Inc.

C

Level 1

Personally Identifiable Information

CERTIFIED SECURITY FOR COMPLIANCECyber security compliance failures can lead to big losses.

Compliancy Requirements

© CertainSafe, Inc

15 ConfidentialSecure Cloud Systems, Inc.

15

AWARD WINNING CYBER PROTECTION

2014Award Winner

2014 Technical Excellence Award

2014 – 2015 - 2016Editor’s Choice

Award

• American Business Awards 2014 “Stevie” for Cloud Security

• PC Magazine – Editor’s Choice Award• 2014• 2015• 2016

• PC Magazine Technical Excellence Award for Best Cyber Security

Award Recognition

Confidential © CertainSafe, Inc

16 ConfidentialSecure Cloud Systems, Inc.

16

• Must ensure only the right people get access to the right information at the right time

• Requires trusted, self-sufficient secured data, backed by technology that outperforms current standards

• It must ensure the security of sensitive data in the “Likely” event of a perimeter defense breach.

A New Security Paradigm Is Required

Change Is Required

© CertainSafe, Inc

17 ConfidentialSecure Cloud Systems, Inc.

17

• It is essential that digital Intellectual property remains private and protected regardless of the type of attack

• full assurance that information remains protected by trustworthy security measures and unavailable to exploitation

A New Security Paradigm Is Required

MicroTokenization and MicroEncryption capabilities ensure that sensitive data remains unavailable to exploitation even in the event of traditional network defense breach

CertainSafe Is The New Paradigm

Change Is Required

© CertainSafe, Inc

18 ConfidentialSecure Cloud Systems, Inc.

For more information contact:

Steven Russo, President / [email protected]

Office: 719-323-6680 X 120

© CertainSafe, Inc