Bona-Data™ Enterprise Gateway

Bona-Data is a data protection gateway that allows any endpoint device or legacy application to interoperate with Bonafeyed’s Cy4Secure™ data protection solution. Bona-Data secures all data to and from any cloud or Software as a Server (SaaS) application, database, or centralized data repository to any endpoint device or processing element. Bonafeyed leverages a data-centric protection approach that operates on the data independent of a protocol or data structure. Bona-Data compliments existing security hardware, software, and infrastructure by encrypting data while transferred and stored - this means that if a hacker can access protected data, they cannot see, read or exploit the information because it will appear as gibberish.

Bona-Data is designed to work with commercial SaaS applications such as, Microsoft office365, Facebook Workplace, and NetSuite, as well as proprietary enterprise CRM or ERP database applications. There is no change to the application’s functionality. Continue to add/delete/edit/search/post within an application as usual. Bona-Data takes care of securing the data so that the data is protected from hackers and cyber-thieves. Patented 800-bit Stream Cipher technology is used to protect the data without impacting the user’s system performance.

Bona-Data encrypts all cloud application data before it is stored in the cloud and decrypts before its sent on to a client’s application. The cloud or in-house system is not negatively impacted – it has no idea that the data is encrypted. Additionally, if the cloud server is hacked and the data stolen, the hackers will only have encrypted data. The IT manager simply installs Bona-Data on a virtual machine or appliance, describes the cloud system, updates the network configuration so Bona-Data exists between the client side and server side, and Bona-Data does the rest.

Bona-Data works in conjunction with Bonafeyed’s Cy4Secure data security solution.

Key features of Bona-Data:


Endpoint Integration

Developers can Integrate Seamless Data Security Capabilities into Their Applications