How is Cy4Secure updated?

Software updates and maintenance are managed by the IT organization and can be pushed when necessary to authorized users or servers (depending on the selected deployment model.)

Does Cy4Secure meet the requirements of GDPR?

Yes. Cy4Secure encrypts all data thereby ensuring that personal information is not divulged to hackers or unauthorized employees of the company.

How much management or maintenance does Cy4Secure require?

Similar to access control lists, IT can disable the account for departing employees or when business with other companies end. Deleting an account would remove all access to any data protected by that employee. All key service maintenance and publicly available browser plugins, application add-in and add-ons updates are performed by Bonafeyed directly.

How do you pronounce Cy4Secure?

[ sahy-fer si-kyoor ] or Cipher-Secure.

If I stop using Cy4Secure can I access encrypted data?

If you want to stop using Cy4Secure you should retrieve and decrypt any protected information that you want to keep and use. Once your account is deleted, it is no longer possible to access data encrypted by you.

Does Bonafeyed ever see my data?

Cy4Secure runs completely on your device, machine, or server. Your data is never sent to Bonafeyed and with Cy4Secure your data is always secured.

Does Bonafeyed know with whom I share encrypted data?

All information regarding you and others is protected using a one-way hash function. It is not possible for Bonafeyed, or anyone else, to discover your names or the names of others you share data with.

Does Cy4Secure help criminals?

Criminals may use Cy4Secure, but if they violate the law, law enforcement can present a duly authorized court order and obtain the encryption keys used by the criminals. With the keys in hand, law enforcement can decrypt court ordered encrypted data.

What applications are supported?

Cy4Secure can support any application that shares data.

Can existing data be protected?

Yes. Bonafeyed can preprocess data in place and encrypt data requests on demand while the preprocessing completes.

What if an employee leaves the company?

Data security access for the ex-employees can be immediately terminated so that any files or data that is protected by Cy4Secure is unusable.

What if I want to revoke access to information/data already sent?

Simply remove user(s) email address associated with the group or just the user from the authorized list.

What happens when a recipient first receives Cy4Secure protected data?

Various options are available and configurable by IT. First time recipient(s) will receive a message from the sender containing an activation notice. Depending on the use case it can be a non-encrypted header included with the encrypted email, or a text message, or a separate email from the sender. In all cases, the user simply follows the instructions to perform a 2-factor authentication, install a browser plugin or application add-in/add-on. In minutes and for all future sharing of data, Cy4Secure will encrypted/decrypted automatically.

Is this an all or nothing deployment decision?

No. Cy4Secure can be deployed or used by a single group, any combination of data can be protected or left in the clear. With the use of Bona-Data™ Security Gateway, IT can start immediately on any application and later deploy natively support application, web plugins or application add-in/ons.

Can Cy4Secure protect more than files?

Yes. Cy4Secure can protect single word, paragraph, table, or a page in a document, a cell, row, column, or sheet in a spreadsheet, a field(s), a row(s) or a column(s) in a data base. It can protect messages or texts or postings.

What does “transparent protection” mean?

User workflows do not require additional steps or time to protect shared data.

Will Cy4Secure work on mobile devices such as tablets and smartphones?

Yes. Bonafeyed has foreground apps for mobile devices to work with productivity applications, websites, SaaS applications, messaging and texting.

What happens if a cyber-criminal breaches our system and takes the encrypted data?

In the event of a data breach, the hackers will gain access to heavily encrypted data that is useless to them. Cy4Secure can protect data on any granularity with each encryption utilizing a different key. For example, a 100 million pieces of data can be encrypted with 100 million different 800-bit encryption keys making it the task of decrypting 100 million times more difficult.

Does Cy4Secure work with other security technologies such as firewalls, network inspection boxes, SSL or data loss protection schemes?

Yes. Cy4Secure is 100% compatible and interoperable with today’s security technologies.

Does Cy4Secure prevent data breaches?

No. Using Cy4Secure ensures that in the event of a data breach, the protected data is useless and cannot by exploited by cybercriminals, employees or bad actors.

How does Cy4Secure work with Office365 and Google Apps?

Cy4Secure can natively protect data within productivity applications using either Add-ins or Add-on or Bonafeyed’s Bona-Data Security Gateway.

Does Cy4Secure work with 3rd Party SaaS platforms such as Saleforce.com, Netsuite or WorkPlace?

Yes. Because SaaS applications are typically databases running in the cloud, Cy4Secures can encrypts data sent to or “shared” with the cloud application. In other words, the SaaS operates on encrypt data that can be stored or searched without any changes.

Can more than one person or company be required to allow access to protected data?

Yes. Cy4Secure supports diversified keys or access controls.

Can only a portion of a spreadsheet or document be protected?

Yes. Cy4Secure can operate on a single word, cell, paragraph, row, column, sheet, or document. The process is analogous to changing the format of text.

Can a messages or texts be protected?

Yes. Cy4Secure passes encrypted data to messaging and texting applications ensuring mobile communications are secure.

Can you protect images as well as data?

Yes. Cy4Secure uses a patented approach to protect data ensuring the data remains interoperable for applications looking for valid image types.

How does the Cy4Secure solution compare to homomorphic technologies?

Cy4Secure does “not” require dedicated computing resources to operate and does not affect the performance of a database application. Cy4Secure works with any database or database driven application without modification, drivers, agents, or modules. Other than allowing basic arithmetic functions on encrypted numerical fields, homomorphic technologies have no benefit over Cy4Secure’s interoperability, compatibility, speed, and flexibility

Does Cy4Secure permit normal database queries on protected data including arithmetic operations on numerical values?

Yes, Cy4Secure encrypted database fields (in columns or rows) including numbers are fully searchable. Protected arithmetic operations can either be performed within authenticated search platforms such as Solr and Elastic or reports can be post processed by an authenticated client.

What happens if an endpoint device is stolen or compromised?

Protected data always remains encrypted on endpoint devices. Access to the protected data can be revoked such that when an endpoint device is compromised, the data is not accessible.

Is backup or archived data still protected?

Absolutely. Once shared data is encrypted and remains encrypted wherever it is stored, on centralized storage, the cloud or an endpoint device. The encrypted data can reside on any system fully protected even when moved to backup archival systems. Once access to this data is removed, the data remains protected and unusable after restored.

Does Cy4Secure protect emails and attachments?

Yes. Cy4Secure can be configured to encrypt the subject line, the body of an email or any attachments automatically or specifically by the sender.

Why is SSL not good enough to protect data?

SSL is mainly designed to protect data during transport and from eavesdroppers when connected using wireless connections. Once the data arrives at its destination, the data resides on the endpoint device in the clear available for anybody to see.

Is Cy4Secure as hard to use as other rights management or public/private key solutions?

No. Classic DRM or IRM solutions first requires a publication step to protect data. Cy4Secure’s approach is to operate transparently and does not require “extra steps” or disruption to your workflows to protect data or the need for separate exchange of public keys or passwords to share encrypted data.