DATABASE SECURE ?
Or is the key under the mat?
Many databases have no protection at all, but for those that have some protection it is no better than having a key hidden under the mat. Those databases are not secured and are vulnerable to attack.
DATABASE SECURED
Secure your databases with the strongest level of protection and without the need to manage or embed encryption keys. Guard and monitor database access to prevent illicit applications from stealing your data. And this protection is implemented without changing your existing applications and with the least impact and best performance possible.
THE DIFFERENCE
SQrazorLoc is a different approach to protecting databases. Like the “Always Encrypted” products, the data is never unprotected at the server or in transit to the user. But unlike those other products, SQrazorLoc eliminates the headaches normally encountered. SQrazorLoc uses NIST validated encryption to protect the database, but in a new way we call DARE, our patented technology. DARE eliminates the headaches by automating the process and reducing the costs. With DARE there is no need for key management or the sharing of keys and/or certificates between computers. SQrazorLoc integrates DARE into the data flow for SQL databases and secures your data from endpoints to database and back.
FEATURES
-
Protection that meets or exceeds regulatory requirements for HIPAA, PCI, and many others.
-
Secure Application Gateway authenticates and monitors database access as well as prevents illicit application access.
-
Ensures protection remains even if database is copied or stolen since no security related data is stored in the database.
-
Works transparently with all of your existing applications to form another layer of protection.
- Simplified client management to ensure all your authorized users have easy access to the critical data they need.
-
Full audit trail and illicit access monitoring to ensure you know what is being accessed and by whom while also being alerted to instances when an attack is being attempted.
- Configuration backups and full recovery process in the case of data corruption due to hardware faults or catastrophic events.
Requirements
Currently the SQrazorLoc driver is supported for use with Windows based clients and servers. For individual client computers needing access to the database or servers that aggregate requests to the database such as web-servers, the SQrazorLoc driver package is installed. The product is configured through the CYPHYX Customer Portal and all installed computers can be configured at once without the need to configure each individually. CYPHYX products operate as a hybrid cloud application with the configuration of the product being all that is done in the cloud and all other function is localized on the customer's computer ensuring no data leaks.
Information and Free Trial Download
Click to Download
For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.
Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"
12870 Trade Way Four
Suite 107 #665
Bonita Springs, Fl. 34135
Email. info@cyphyx.com