Standalone or Integrated, either way they form a solution
The CYPHYX Model
The CYPHYX model is composed of multiple parts that work together to create simple, customizable solutions for many of the cybersecurity problems that confront businesses and individuals today.
The first part of the model is the concept of a component instead of a suite. When it comes to most products on the market, when you find one that has the specific feature that will solve your problem or fill your need, it is usually part of a larger suite of features, many of which you know you will never use. This means buying an entire suite for just that one part and while you may be able to find uses for some of the other parts, in general you overpay for what you really needed.
With CYPHYX products, we build components that can operate as individual standalone products targeting specific problems or needs. But also, CYPHYX components can also integrate with each other to form larger more complex solutions, allowing the customer to build specific packages of features to solve their own unique problems or fill their own specific needs.
The second part of the model is the concept of "easy-in, easy-out". For many cybersecurity products the process to implement is complex, requiring extensive planning, resources, and time to complete. And for those products you decide to back out and uninstall, again they require more planning, resources, and time.
CYPHYX products are designed to be simple to install and just as simple to uninstall should you decide the component does not suit your needs. In both cases the process is designed with automation, verification, and simplification. To install a product requires nothing more than execution of an install package, followed by configuration, and then, once all is verified to be correctly installed and configured, activation by the customer initiates the final step after which the product is live and functional.
With CYPHYX products you should never be in a position of requiring extensive work to install or uninstall and with this simple process you have the freedom to install and evaluate whether a product solves the problem or meets the need.
Another part of the model is the ability to configure and administer all of your CYPHYX products securely and from anywhere. With many products on the market today you install it on a single computer and then need to administer and configure it there. For some products there are applications for administering and configuring multiple computers. In all cases they require additional setup, resources, and time to use these products.
With CYPHYX products, the administration and configuration is centralized in a secure and easy to access customer portal. This portal allows the customer to monitor the function of the CYPHYX products they are subscribed to use. It also allows them to alter the configuration for any of these products as well as to administer them in regards to performance and event handling. If a performance problem exists or an error has occurred the customer will know and have access to all the necessary data to solve the problem.
The easy to use Customer Portal provides a single interface to all the CYPHYX products for which the customer has subscribed. It also provides them the means to also add products, delete products, move installed products, and renew subscriptions when needed. The CYPHYX Customer Portal is the one interface for all your CYPHYX products.
For really secure communications, you then need to share a new key each time you want to communicate information that is supposed to be secret. The use of a new key each time is considered to be equivalent to using what cryptographers call a one-time pad. A one-time pad harkens back to the days when an actual encryption key was distributed on paper and a unique sheet of paper was used each time. Because each key is used only once, cracking such encryption is difficult.Wayne Rash, eWeek article, "Why Quantum-Resistant Encryption Needs Quantum Key Distribution for Real Security"