Protecting client data against cyberthreats. Guaranteed 100% cloud data availability and control. Managing users and unp
SECURING CRITICAL CUSTOMER DATA IN THE CLOUD Enterprise-class data encryption for securing critical customer information anytime, anywhere.
Data Security in Telecommunications The telecommunications industry is a prime target for hackers due to the vast and increasing amount of personal data being managed on cell phones, satellites, and the internet. Cyphre’s enterprise data protection suite necessary security to nullify cyberattacks and to avoid the associated high costs and liabilities. Cloud security issues facing the telecommunications industry include: ✓ Subscriber privacy ✓ Protection from identity theft ✓ Ability to share files using secure links ✓ Protecting client data against cyberthreats ✓ Guaranteed 100% cloud data availability and control ✓ Managing users and unprotected third-party apps Telecommunications wide portfolio of services that include internet, wireless communication, mobility, cloud, research on communication systems and tools, managed security, and more. This increasing dependence on the telecommunications networks in addition to the growth of the digital workplace is resulting in heightened cybersecurity risks. Cyphre allows the industry to use this opportunity to become leaders in data security with the use of BlackTIE® encryption, which protects previously vulnerable encryption keys, rendering any hijacked data useless to hackers.
BlackTIE® Benefits Unassailable Protection Cyphre’s BlackTIE® augments vulnerable single encryption keys with hardware-encrypted Black Keys to render hijacked keys useless, thus nullifying potential threats.
Productivity & Collaboration BlackTIE® operates transparently and is invisible to the end user for a seamless user experience. Its heightened security does not hinder the ability of businesses and their employees to be productive, nor does it limit collaboration.
Key Per File Protection Rather than using a single encryption key to protect files, BlackTIE® uses a unique key for each individual file as an extra layer of security.
Key Management Many enterprises wish for their IT departments to manage their keys; BlackTIE® allows the option for total control of encryption keys.
640 TB
amount of data is transfered in 60 seconds over the internet
BlackTIE® Encryption Architecture Cyphre Key Management System
Collaboration/Sharing Application:
Identity Access Management AD/LDAP
Cyphre Encryption Gateway, Webserver/TLS, Redis Data Cache
OpenSSL with CryptoDev extension Cyphre Security Engine CryptoDev API
BlackTIE® Key Protection, Encryption, & Management
SEC4.0 Driver: AES, ECDH, Black Keys, TRNG Hardened Linux OS
BT-1 Appliance:
SEC 4.0 Security Engine
- OTPMK and KEKs - SecureBoot HW Boot Image authentication - True Random Number Generator
Data in Transit [Protected] Data at Rest [Protected] Amazon, Box, ...
BlackTIE® Technology Cyphre’s BlackTIE® encryption technology protects the privacy of clients’ information through the use of Black Keys. These hardware-encrypted keys add an extra layer of security on top of standard TLS encryption. This approach guarantees that only those systems with verifiable keys can view files. Unlike software-only encryption, Black Keys are never readable in plaintext, nor are they exposed in memory. Even if a threat event occurs and an attacker rendered completely unusable. Further, Cyphre does not require a threat to be detected in order to instantiate protection. The nature of Cyphre’s blackened keys ensures that they are unusable and indecipherable at all times.
About Cyphre Headquartered in Austin, Texas, Cyphre cloud encryption technology provides the highest level of security for cloud data. Period. Collaboration services, Secure IoT Integration and the Enterprise Cloud Encryption Gateway. www.cyphre.com
Copyright © 2017 Cyphre
@getcyphre
Cyphre
/getcyphre
More information at www.cyphre.com
REV 8/17