2. Introducing
CipherLoc
CipherLoc started with a simple mission: To protect the world’s data
in an increasingly insecure world. CipherLoc is at the forefront of
cryptology innovation as we build ironclad data protection solutions
for businesses of all sizes.
DRAMATICALLY ENHANCES SECURITY
Eliminates flaws and weaknesses in existing encryption technology
EASILY ADDED TO EXISTING SOLUTIONS
Companies can easily add CipherLoc into their existing software
to keep their customers’ data completely safe from cybercriminals
who are adept at compromising data
SCALABLE, FUTURE-PROOF TECHNOLOGY
CipherLoc security and protection will improve as computational
horsepower increases
3.
4. Modern Encryption
Algorithms Are Broken
Conventional wisdom assumes modern algorithms are safe because
it would take an impractical amount of time for a brute force attack
to successfully crack the encryption key used to protect data.
However, it can be demonstrably shown that it is possible to “break”
into encrypted files using plaintext-recovery techniques that do not
rely on brute force attacks.
Every business will inevitably face some level of hacking. As the
tools and skill of cybercriminals expand, businesses must keep up.
Cyber security incidents rose by 38% in 2015, and in the last 2 years,
over 1.7 billion data records were compromised. From regulatory
requirements to increasing consumer demands for privacy,
data protection and user privacy has become a non-negotiable
requirement. CipherLoc is and will continue to be relentless in our
commitment to deliver solutions that strive to fulfill its mission to
protect the world’s data.
5.
6. Our Approach
HOW DOES OUR TECHNOLOGY WORK?
First, CipherLoc decomposes data files to be protected into multiple
segments. Then, these individual segments each receive a unique
one-time use encryption key, utilize a randomized selection of
encryption algorithms, and are grouped into a variety of different
lengths. Since segments are independent from each other and are
individually protected, the CipherLoc technology is not susceptible
to the attacks and vulnerabilities associated with modern encryption
algorithms which operate on a monolithic block of data.
EXISTING METHODS
Each message is treated as a monolithic block of data; messages
are encrypted using keys; and block sizes must exactly match
the size of the key.
• Susceptible to plain-text recovery attacks
• Latency increases as key sizes increase
• Costly upgrades needed to update algorithms
CIPHERTEXTPLAINTEXT
7. Each message is broken into multiple segments. Each individual
segment has a unique key, a unique encryption method, are randomly
grouped into different lengths, can be further re-encrypted.
Segments are independent from each other.
• Not susceptible to computational attacks
• Low latency, small size, leverages TCP/IP
• Security improves as technology improves
1. FRACTURE 2. RANDOMIZE KEYS
& ALGORITHMS
3. SECURE
OUR APPROACH
8. Solution Suite
CipherLoc EDGE
Installed on mobile/handset devices, EDGE enables data to
be securely sent between any two mobile devices.
CipherLoc ENTERPRISE
Installed on desktops, laptops and tablet computers, ENTERPRISE
enables data to be securely sent between any two platforms.
CipherLoc GATEWAY
Installed on servers, GATEWAY enables end-to-end data protection
to and from servers, computers, tablets, and/or mobile devices via
the GATEWAY-protected servers.
10. Use Cases
DATA PROTECTION FOR BUSINESSES OF ALL SIZES TO
ACCOMMODATE A WIDE VARIETY OF USAGE MODELS
• Service providers who are seeking to offer highly-secure
protection of data to their clients
• Application developers who currently use encryption technology
in their products and who need a more secure solution that can
be easily and seamlessly added
• Other security software companies wishing to enhance their
products and offerings through the addition of an innovative
data protection solution
• Systems integrators who can offer a more secure solution to
their clients in the healthcare, financial, banking, and any other
industry where data protection and user privacy is important