Bona-Data™ Enterprise Gateway


Bona-Data manages all data security to and from any cloud or Software as a Server (SaaS) application. Bonafeyed technology is data-centric. That is, it operates on the data independent of the protocol or data structure.  Bona-Data compliments existing security hardware, software, and infrastructure by encrypting data while transferred and stored - this means that if a hacker can access data, they cannot see, read or exploit the data because it will appear as gibberish.  Bona-Data works just as well with commercial applications like salesforce.com, Microsoft office365, Facebook workday, and NetSuite, as it does with proprietary enterprise CRM or Health Information Systems applications.


There is no change to application functionality. Continue to add/delete/edit/search/post within the application as usual. Bona-Data takes care of securing the data so that the data is protected from hackers and cyber-thieves. Patented 800-bit Stream Cipher technology is used to protect the data without impacting the user’s system performance.


Bona-Data encrypts all cloud application data before it is stored in the cloud and decrypts the data when it is en route to the client application. The cloud system is not negatively impacted – it has no idea that the data is encrypted. Additionally, if the cloud server is hacked and the data stolen, the hackers will only have encrypted data. The IT manager simply installs Bona-Data on a virtual machine or appliance, describes the cloud system, updates the configuration so Bona-Data exists between the client side and server side, and Bona-Data does the rest.

 

Bona-Data Architecture

 

Bona-Data works in conjunction with Bonafeyed’s Key Management Service. 800-bit encryption keys are created and managed by KMS and used to encrypt or decrypt data by Bona-Data.


Key features of Bona-Data:

  • Secured data gateway for any legacy and 3rd party SaaS applications
  • Encrypts and Decrypts data between application servers and gateway
  • 800-bit encryption, data “vector ciphering”, and admin dashboard
  • Works in conjunction with KMS SaaS Key Management Service
  • High availability active-active n+m cluster failover design
  • Low-latency, high throughput architecture 
Contact us at info@bonafeyed.com to request pricing and a demonstration.