1 ConfidentialSecure Cloud Systems, Inc.
CertainSafe®, Inc.
Digital Vault Technology
Technology Overview
May 2016
© CertainSafe, Inc.
2 ConfidentialSecure Cloud Systems, Inc.
CertainSafe (CSI) Digital Vault Technology
• Replaces sensitive data with unique MicroTokens®
• MicroTokens are similar to Credit Card tokens
• MicroTokens do not use ant part of the original data in their creation
• Credit card tokens are limited to 16 characters / letters/digits
Ultra secure cybersecurity solutions to protect digital information exploitation
Intro to the Digital Vault
© CertainSafe, Inc
3 ConfidentialSecure Cloud Systems, Inc.
CertainSafe® (CSI) Digital Vault Technology
• MicroTokens convert up to 2 GB of a single data instance
(2 GB = 16 billion bits ) including but not limited to data files
• CertainSafe Digital Vault engine can create 60+ million MicroTokens per
minute
• It’s architecture, built modular in design, stands ready to meet expansive
growth demands as required, by specific need
Intro to the Digital Vault
Protection again traditional data breach exploitation when perimeter defenses are compromised
© CertainSafe, Inc
4 ConfidentialSecure Cloud Systems, Inc.
The Internet Was Not Designed For Security
• Every device is open to malicious attack
• Each access point provides an additional opportunity for a
security breach to occur
• Current architectures provide vulnerabilities that create
potential mass data breach threats
Challenge
“We didn’t focus on how you could wreck this system intentionally” - Vince G. Cerf VP/ Chief Evangelist for Google.
© CertainSafe, Inc
5 ConfidentialSecure Cloud Systems, Inc.
The Internet Was Not Designed For Security
• These threats can be mitigated with the deployment of
MicroTokenization
• Large-scale “Cloud” ecosystems must be secured
• Local Intranet installations containing sensitive data will
not be safe until security can be assured
Challenge
Privacy and security has been “bolted on” – Quoted by Mikko Hyppönen (CRO at F-Secure )
© CertainSafe, Inc
6 ConfidentialSecure Cloud Systems, Inc.
• Ponemon Institute - 43 % of companies experienced
a data breach in 2014
• Symantec 2015 - Zero-day vulnerabilities more
than doubled to 54, a 125 %
increase from the year before
• 9 “Mega-Breaches”- Reported number of exposed
identities soared to
429,000,000 (429 million).
• Unreported 2015 - Conservative estimate of
records lost now more than half
a billion (500,000,000).
Data Breaches Continue to Increase Exponentially Year Over Year
From 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019
Opportunity
© CertainSafe, Inc
7 ConfidentialSecure Cloud Systems, Inc.
• Networked and connected devices/systems can be uniquely
protected and secured
• Sensitive data no longer remains on devices as it is replaced
with MicroTokens as placeholders
• End-to-End Encryption schema is provided for data in motion
as well as data at rest
The Cyber-Security Paradigm - MicroTokenization®
Sensitive data is removed from existing systems therefore mitigating the threat of external exploitation when a breach occurs
Solution
© CertainSafe, Inc
8 ConfidentialSecure Cloud Systems, Inc.
• Helps prevent man-in-the-middle attacks with added
credentialing
• Provides the capability to string together proprietary business
rules for accessibility
• Compatible with existing firewalls, ID management, secure
network protocols , encryption algorithms
• Compliments existing security investments
The Cyber-Security Paradigm - MicroTokenization®
Agnostic to the form of data that’s requires additional protection
Solution
© CertainSafe, Inc
9 ConfidentialSecure Cloud Systems, Inc.
• Advanced data-centric platform beyond PCI
DSS Level 1 standards
• MTE engine that’s extremely configurable
• MicroTokens, ensure levels of security
unattainable with traditional network defenses
• Combines with client preferred algorithms
addicting additional protection
Technology Overview
SaaS – Security as a Service Taking Shape
MicroTokenized / MicroEncrypted data can be protected and potentially eliminate possible mass data breach attacks
© CertainSafe, Inc
10 ConfidentialSecure Cloud Systems, Inc.
MicroTokenization adds comprehensive cyber protection within existing legacy systems as well as newly created platforms.
Technical Overview
Existing Systems Can be Updated – Enhance Rather Than Replace
• Upgrading your security doesn't require changing your system.
• Gain PFI and HIPPA compliant level security while preserving real-time
data access within existing platforms
• Agnostic to the type of data requiring protection
• API Library allows configurable access to the platform
• Comprehensive, self-service SDK (Software Development Kit)
• Customized solutions
© CertainSafe, Inc
11 ConfidentialSecure Cloud Systems, Inc.
Security is everywhere
The Multiple Layers of MicroTokenization Enhance Security
A host of techniques are deployed in conjunction with the already ultra-secure CertainSafe tokenization and Encryption processes
• Every single piece of digital data is protected and encrypted individually
• Every piece of encrypted digital data is assigned its’ own proprietary set
of access keys
• Original sensitive data is completely removed from clients systems
o In the event of a breach only useless MicroTokens are exposed
MicroEncryption® breaks the encrypted data into
smaller bits and scatters them across multiple hard drives
CertainSafe
Server System
© CertainSafe, Inc
12 ConfidentialSecure Cloud Systems, Inc.
CertainSafe Payment Services
Protects payment information from hackers is vital in today's digital age.
• CertainSafe Payment Services can either replace, our continue to work with a
clients’ current payment Processor/ Gateway provider
• Secures and stores all payment information - Not just the credit card number
- Up to 2GB /field/file
• Payment instructions and business rules securely stored for recurring
processing an analytics
E-Commerce Protection
®
© CertainSafe, Inc
13 ConfidentialSecure Cloud Systems, Inc.
MICROTOKENIZATION
LIVEDEMONSTRATION
• CertainSafe offers a Security as a Service SDK
(software development kit) providing Developers
access to its award-winning MicroTokenization® and
MicroEncryption®
• Simple, cost effective approach to secure system and
application data at a level never before thought
possible.
MicroTokens are created before your eyes and then
stored in CertainSafe’s Digital Vault in Real-Time
(Available upon request)
Live Tokenization Demo
MicroTokenization
of
Files
MicroTokenization
of
Text
© CertainSafe, Inc
14 ConfidentialSecure Cloud Systems, Inc.
Level 1
Personally Identifiable
Information
C
CERTIFIED SECURITY FORCOMPLIANCE
Cyber security compliance failures can lead to big losses.
Compliancy Requirements
© CertainSafe, Inc
15 ConfidentialSecure Cloud Systems, Inc.
AWARD WINNING CYBER PROTECTION
2014
Award Winner
2014 Technical
Excellence Award
2014 – 2015 - 2016
Editor’s Choice Award
15
• American Business Awards 2014
“Stevie” for Cloud Security
• PC Magazine – Editor’s Choice Award
• 2014
• 2015
• 2016
• PC Magazine Technical Excellence
Award for Best Cyber Security
Award Recognition
Confidential © CertainSafe, Inc
16 ConfidentialSecure Cloud Systems, Inc.
16
• Must ensure only the right people get access to the right
information at the right time
• Requires trusted, self-sufficient secured data, backed by
technology that outperforms current standards
• It must ensure the security of sensitive data in the
“Likely” event of a perimeter defense breach.
A New Security Paradigm Is Required
Change Is Required
© CertainSafe, Inc
17 ConfidentialSecure Cloud Systems, Inc.
17
• It is essential that digital Intellectual property remains
private and protected regardless of the type of attack
• full assurance that information remains protected by
trustworthy security measures and unavailable to
exploitation
A New Security Paradigm Is Required
MicroTokenization and MicroEncryption capabilities
ensure that sensitive data remains unavailable to
exploitation even in the event of traditional network
defense breach
CertainSafe Is The New Paradigm
Change Is Required
© CertainSafe, Inc
18 ConfidentialSecure Cloud Systems, Inc.
For more information contact:
Steven Russo, President / srusso@certainsafe.com
Office: 719-323-6680 X 120
© CertainSafe, Inc

CertainSafe MicroTokenization Technology Detailed Overview

  • 1.
    1 ConfidentialSecure CloudSystems, Inc. CertainSafe®, Inc. Digital Vault Technology Technology Overview May 2016 © CertainSafe, Inc.
  • 2.
    2 ConfidentialSecure CloudSystems, Inc. CertainSafe (CSI) Digital Vault Technology • Replaces sensitive data with unique MicroTokens® • MicroTokens are similar to Credit Card tokens • MicroTokens do not use ant part of the original data in their creation • Credit card tokens are limited to 16 characters / letters/digits Ultra secure cybersecurity solutions to protect digital information exploitation Intro to the Digital Vault © CertainSafe, Inc
  • 3.
    3 ConfidentialSecure CloudSystems, Inc. CertainSafe® (CSI) Digital Vault Technology • MicroTokens convert up to 2 GB of a single data instance (2 GB = 16 billion bits ) including but not limited to data files • CertainSafe Digital Vault engine can create 60+ million MicroTokens per minute • It’s architecture, built modular in design, stands ready to meet expansive growth demands as required, by specific need Intro to the Digital Vault Protection again traditional data breach exploitation when perimeter defenses are compromised © CertainSafe, Inc
  • 4.
    4 ConfidentialSecure CloudSystems, Inc. The Internet Was Not Designed For Security • Every device is open to malicious attack • Each access point provides an additional opportunity for a security breach to occur • Current architectures provide vulnerabilities that create potential mass data breach threats Challenge “We didn’t focus on how you could wreck this system intentionally” - Vince G. Cerf VP/ Chief Evangelist for Google. © CertainSafe, Inc
  • 5.
    5 ConfidentialSecure CloudSystems, Inc. The Internet Was Not Designed For Security • These threats can be mitigated with the deployment of MicroTokenization • Large-scale “Cloud” ecosystems must be secured • Local Intranet installations containing sensitive data will not be safe until security can be assured Challenge Privacy and security has been “bolted on” – Quoted by Mikko Hyppönen (CRO at F-Secure ) © CertainSafe, Inc
  • 6.
    6 ConfidentialSecure CloudSystems, Inc. • Ponemon Institute - 43 % of companies experienced a data breach in 2014 • Symantec 2015 - Zero-day vulnerabilities more than doubled to 54, a 125 % increase from the year before • 9 “Mega-Breaches”- Reported number of exposed identities soared to 429,000,000 (429 million). • Unreported 2015 - Conservative estimate of records lost now more than half a billion (500,000,000). Data Breaches Continue to Increase Exponentially Year Over Year From 2013 to 2015 the cyber crime costs quadrupled, and it looks like there will be another quadrupling from 2015 to 2019 Opportunity © CertainSafe, Inc
  • 7.
    7 ConfidentialSecure CloudSystems, Inc. • Networked and connected devices/systems can be uniquely protected and secured • Sensitive data no longer remains on devices as it is replaced with MicroTokens as placeholders • End-to-End Encryption schema is provided for data in motion as well as data at rest The Cyber-Security Paradigm - MicroTokenization® Sensitive data is removed from existing systems therefore mitigating the threat of external exploitation when a breach occurs Solution © CertainSafe, Inc
  • 8.
    8 ConfidentialSecure CloudSystems, Inc. • Helps prevent man-in-the-middle attacks with added credentialing • Provides the capability to string together proprietary business rules for accessibility • Compatible with existing firewalls, ID management, secure network protocols , encryption algorithms • Compliments existing security investments The Cyber-Security Paradigm - MicroTokenization® Agnostic to the form of data that’s requires additional protection Solution © CertainSafe, Inc
  • 9.
    9 ConfidentialSecure CloudSystems, Inc. • Advanced data-centric platform beyond PCI DSS Level 1 standards • MTE engine that’s extremely configurable • MicroTokens, ensure levels of security unattainable with traditional network defenses • Combines with client preferred algorithms addicting additional protection Technology Overview SaaS – Security as a Service Taking Shape MicroTokenized / MicroEncrypted data can be protected and potentially eliminate possible mass data breach attacks © CertainSafe, Inc
  • 10.
    10 ConfidentialSecure CloudSystems, Inc. MicroTokenization adds comprehensive cyber protection within existing legacy systems as well as newly created platforms. Technical Overview Existing Systems Can be Updated – Enhance Rather Than Replace • Upgrading your security doesn't require changing your system. • Gain PFI and HIPPA compliant level security while preserving real-time data access within existing platforms • Agnostic to the type of data requiring protection • API Library allows configurable access to the platform • Comprehensive, self-service SDK (Software Development Kit) • Customized solutions © CertainSafe, Inc
  • 11.
    11 ConfidentialSecure CloudSystems, Inc. Security is everywhere The Multiple Layers of MicroTokenization Enhance Security A host of techniques are deployed in conjunction with the already ultra-secure CertainSafe tokenization and Encryption processes • Every single piece of digital data is protected and encrypted individually • Every piece of encrypted digital data is assigned its’ own proprietary set of access keys • Original sensitive data is completely removed from clients systems o In the event of a breach only useless MicroTokens are exposed MicroEncryption® breaks the encrypted data into smaller bits and scatters them across multiple hard drives CertainSafe Server System © CertainSafe, Inc
  • 12.
    12 ConfidentialSecure CloudSystems, Inc. CertainSafe Payment Services Protects payment information from hackers is vital in today's digital age. • CertainSafe Payment Services can either replace, our continue to work with a clients’ current payment Processor/ Gateway provider • Secures and stores all payment information - Not just the credit card number - Up to 2GB /field/file • Payment instructions and business rules securely stored for recurring processing an analytics E-Commerce Protection ® © CertainSafe, Inc
  • 13.
    13 ConfidentialSecure CloudSystems, Inc. MICROTOKENIZATION LIVEDEMONSTRATION • CertainSafe offers a Security as a Service SDK (software development kit) providing Developers access to its award-winning MicroTokenization® and MicroEncryption® • Simple, cost effective approach to secure system and application data at a level never before thought possible. MicroTokens are created before your eyes and then stored in CertainSafe’s Digital Vault in Real-Time (Available upon request) Live Tokenization Demo MicroTokenization of Files MicroTokenization of Text © CertainSafe, Inc
  • 14.
    14 ConfidentialSecure CloudSystems, Inc. Level 1 Personally Identifiable Information C CERTIFIED SECURITY FORCOMPLIANCE Cyber security compliance failures can lead to big losses. Compliancy Requirements © CertainSafe, Inc
  • 15.
    15 ConfidentialSecure CloudSystems, Inc. AWARD WINNING CYBER PROTECTION 2014 Award Winner 2014 Technical Excellence Award 2014 – 2015 - 2016 Editor’s Choice Award 15 • American Business Awards 2014 “Stevie” for Cloud Security • PC Magazine – Editor’s Choice Award • 2014 • 2015 • 2016 • PC Magazine Technical Excellence Award for Best Cyber Security Award Recognition Confidential © CertainSafe, Inc
  • 16.
    16 ConfidentialSecure CloudSystems, Inc. 16 • Must ensure only the right people get access to the right information at the right time • Requires trusted, self-sufficient secured data, backed by technology that outperforms current standards • It must ensure the security of sensitive data in the “Likely” event of a perimeter defense breach. A New Security Paradigm Is Required Change Is Required © CertainSafe, Inc
  • 17.
    17 ConfidentialSecure CloudSystems, Inc. 17 • It is essential that digital Intellectual property remains private and protected regardless of the type of attack • full assurance that information remains protected by trustworthy security measures and unavailable to exploitation A New Security Paradigm Is Required MicroTokenization and MicroEncryption capabilities ensure that sensitive data remains unavailable to exploitation even in the event of traditional network defense breach CertainSafe Is The New Paradigm Change Is Required © CertainSafe, Inc
  • 18.
    18 ConfidentialSecure CloudSystems, Inc. For more information contact: Steven Russo, President / srusso@certainsafe.com Office: 719-323-6680 X 120 © CertainSafe, Inc