An introduction to Cryptosoft



Similar documents
IoT Business Solutions

Insight Guide. Encryption: A Guide

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

API Management: Powered by SOA Software Dedicated Cloud

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Taking Big Data to the Cloud. Enabling cloud computing & storage for big data applications with on-demand, high-speed transport WHITE PAPER

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Jitterbit Technical Overview : Microsoft Dynamics CRM

Business Case for Voltage Secur Mobile Edition

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Security Considerations for DirectAccess Deployments. Whitepaper

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief

Symantec Consulting Services

Realizing the Big Data potential - from data to business intelligence

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Top 10 Reasons Enterprises are Moving Security to the Cloud

Case Study for Layer 3 Authentication and Encryption

Towards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...

Cisco AON Secure File Transfer Extension Module

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

Reduce IT Costs by Simplifying and Improving Data Center Operations Management

Storage Infrastructure as a Service

How To Protect Your Cloud From Attack

management solutions

Dell s Unified Clinical Archive Solution

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

BANKING SECURITY and COMPLIANCE

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

CA Cloud Overview Benefits of the Hyper-V Cloud

IT Services. Capita Private Cloud. Cloud potential unleashed

Securing Data in the Cloud

Incident Reporting & Management

An Enterprise Architect s Guide to API Integration for ESB and SOA

Jitterbit Technical Overview : Microsoft Dynamics AX

Basics of Internet Security

TrustNet Group Encryption

TOP SECRETS OF CLOUD SECURITY

Effective End-to-End Cloud Security

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

Data-Centric Security vs. Database-Level Security

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Whitepaper : Cloud Based Backup for Mobile Users and Remote Sites

Top 5 reasons to choose HP Information Archiving

The Evolution of the Service Desk: White Paper

Securing Enterprise Mobility for Greater Competitive Advantage

Requirements When Considering a Next- Generation Firewall

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

Cloud Computing Security Considerations

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Symantec Managed PKI Service Deployment Options

Cloud and Data Center Security

Secure any data, anywhere. The Vera security architecture

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

I D C A N A L Y S T C O N N E C T I O N

A HELPING HAND TO PROTECT YOUR REPUTATION

Unifying the Distributed Enterprise with MPLS Mesh

ABS Information Systems Inc. 307 Lesmill Rd, Toronto, Ontario, Canada, M3B 2V1 Phone:

Creating a Strong Security Infrastructure for Exposing JBoss Services

Protecting Applications on Microsoft Azure against an Evolving Threat Landscape

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Voltage Secure Commerce

Top 5 reasons to choose HP Information Archiving

Key Cyber Risks at the ERP Level

Centrify Cloud Connector Deployment Guide

HIGH-SPEED BRIDGE TO CLOUD STORAGE

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Secure web transactions system

OVERVIEW. Enterprise Security Solutions

Sentinet for BizTalk Server SENTINET 3.1

Readiness Assessments: Vital to Secure Mobility

How To Get To A Cloud Storage And Byod System

Vulnerability Management

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Jitterbit Technical Overview : Salesforce

Transcription:

An introduction to Cryptosoft

Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company needs to go through to deliver a robust, scalable and easy to use policy based encryption service that operates within existing workflows. Through the Cryptosoft platform, we provide our customers with dramatic and disruptive capabilities to secure their most important asset: their data, as it moves from device to device. Cryptosoft s distributed agent architecture presents a single, simple abstraction of otherwise complex encryption and authentication methods, providing an opportunity to dramatically simplify and reduce the costs associated with solving modern day data security challenges. Cryptosoft directly addresses the universal challenge of securing information within an increasingly connected world to ensure integrity, privacy and compliance.

The Market Opportunity Established big name security vendors have all done a pretty good job of making encryption services ubiquitous and easy for securing user initiated data such as email; what they haven t done is deliver an enterprise strength solution that simplifies the management and provisioning of security services into automated information flows. As a direct response many customers have built their own management capability using a combination of third party toolsets and bespoke coding. This approach does not scale, leaves organisations open to risk, and ultimately is not fit for purpose. Cryptosoft fills a gap in the market Cryptosoft has responded to a gap in the market and delivers a data centric approach to securing information within IoT, eliminating today s dependency placed on inadequate transport level security models. We do this without disrupting existing workflows or re-coding existing applications, using a standards-based platform that delivers same day value. We are completely hardware, software and security system agnostic providing ultimate flexibility for securing information wherever it resides. Many organisations have adopted Cryptosoft as the standard platform for provisioning Security as a Service within their IT ecosystem, shortening deployment times, simplifying architecture and reducing business risk.

The Cryptosoft Platform Cryptosoft has been built from the ground up over the last three years based on our first hand experience of the challenges faced by organisations to secure their information assets in an automated, transparent, scalable fashion. Cryptosoft is built on a proven technology foundation called Spring, which ensures we have the ability to offer an unparalleled level of agility and flexibility in any given use case. Data Adaptors We believe security should revolve around the data that is why we make it easy for you to secure this all-important asset, in storage and in transit. The key to this is our ability to transparently consume data payloads without disrupting existing business processes or information workflows. Importantly, our distributed agent architecture ensures this is achieved end to end. RESTful API s Our agents can consume data synchronously or asynchronously at the application layer via our simple REST API. Minimal configuration changes are required to securely wire an existing information flow using this method. Gateway Proxy Our gateway agents process data transparently by proxying HTTP or MQTT protocols without impacting performance (up to 10,000 connections per second introduces <2ms of latency with 1k payload), this includes encryption or decryption of the data. File Collectors Where an API or gateway based approach is not feasible we also have the ability to collect data at a file system level using SMB, FTP or SFTP. Collection and delivery of data can also be facilitated directly into cloud based storage systems such as Amazon S3, Azure and Dropbox.

Policy Securing your data should be easy; Cryptosoft policies are central to making this happen by using simple rules to determine how your data is secured. Whether using our native web console or dynamically constructing policy from your own console or application via our RESTful API, our platform makes this process simple and quick. Transparent, seamless deployment to our distributed agents then ensures your data is secured end to end. Encryption & Decryption Although at the heart of what we deliver, Encryption and Decryption is simply a data transformation output from our platform. Cryptosoft takes an agnostic approach to the use of encryption algorithms and security protocols. Wherever possible we provide customer choice in the use of native algorithms providing transparency and flexibility in downstream decryption of data. Cryptosoft supports a number of symmetric and asymmetric key methods, from traditional on-premise or managed PKI solutions through to a tightly coupled Dynamic Device Key Generation (DDKG) model that provides scale demanded by IoT deployments. Once again we believe customer choice is paramount given that significant investments in this area may have already been made. Authentication Remember how the address space limitations of IPV4 threatened to grind Internet growth to a halt? Our current reliance on X.509 endpoint certificates has the potential to cripple IoT in the same way. The key management, deployment, expiration tracking and security vulnerabilities associated with static endpoint certificates make them untenable as a scalable security solution for endpoint authentication and encryption for the estimated 50 billion devices that will be deployed by 2020. For IoT growth, performance and scale, it requires a device authentication solution that eliminates the need for endpoint certificate deployment and management. We can leverage advanced, M2M authentication to deliver on-the-fly key and certificate generation for mass-scale IoT deployments that eliminate theft and duplication vulnerabilities associated with static certs while preventing device spoofing and cloning.

Benefits Cryptosoft directly addresses the universal challenge of securing information within an increasingly connected world to ensure integrity, privacy and compliance. Plug & play The Cryptosoft platform is plug & play and eliminates the need for complex customised code to provision security to IoT applications and connected devices. Quickly configured The solution is up and running in a very short time frame with little upfront investment in technology infrastructure. Best practice approach Customer data traversing the network from device to device is encrypted in a best practice, data-centric fashion. Customers can focus on their core business whilst instantly reducing the attack surface for modern day threats. Compliance achieved Organisations are able to easily achieve compliance with the rapidly evolving security legislation using Cryptosoft. Global brands remain protected and outsider threats are mitigated. Using a single, standard based platform organisations are able to consolidate technologies and drive down costs. Flexible business model The Cryptosoft Platform s API s allow it to securely transfer data to a broad range of different systems and services, allowing the Provider to support different business models and SLA s in a single architecture. Standardised and repeatable approach The solution provides a simple and repeatable approach to solving data security problems of IoT projects by providing a standard approach to encryption and key management.

Seamless end-to-end security for every IoT ecosystem Email sales@cryptosoft.com www.cryptosoft.com 2015 Cryptosoft. All rights reserved.