Data Defined Security Brief |
Data-In-Use Protection Brief |
Data Security Domain Brief |
||
---|---|---|---|---|
Bonafeyed views data security holistically. Our “Data Defined Security” approach ensure the customer’s data is never touched by Bonafeyed, data and decryption keys only converge on authorized devices. Data is individually encrypted requiring many keys to access a single data record and operates with existing applications and deployments.
Read the brief > |
Advances in data security has predominantly occurred for “data-in-transit” and “data-at-rest”. Bonafeyed gives unparalleled “data-in-use” protection for databases. This means databases or applications backed by databases are given the ability to operate and query encrypted data without changes to the DBMS or its infrastructure. Learn how Cy4Secure allows full relational operations on database management systems.
Read the brief > |
Once protected data leaves the owner’s security or network domain, they effectively lose control of the data. Typically, data is delivered in the clear or as plain text on the end-point machines from an application. Bonafeyed, allows encrypted data to remain protected as it traverses different domains or users but still gives fully control to accessibility by the owner. Learn how we safeguard data after it leaves the application’s domain.
Read the brief > |
Split-Path Scalability Brief |
Encrypted Data Searches Brief |
Cy4Secure Architecture Brief |
||
---|---|---|---|---|
Scalability and performance are hallmarks of Cy4Secure’s architecture. This comes from separating the application data paths from managing its security. The delivery and communication of an application remains the same and untouched, no bump-on-wire, servlets, or intermediate choke points. Authorization, cipher key delivery, and cryptographic operations are independent and decentralized to the endpoint devices. This gives Cy4Secure unparallel performance and security.
Read the brief > |
Learn how Bonafeyed allows common databases to operate with encrypted data without changes to the DBMS or requiring special client-side drivers or search engines. Fully relational searches including exact match, starts-with, contains, and ranged relational operations such as filters, joins and sorts also remain functional with imperceptible impacts to performance or functionality.
Read the brief > |
See what makes Bonafeyed work from the inside. The Cy4Secure Arbiter is at the heart of the data defined security technology. The concept is simple but very powerful to ensure users are authenticated on any of their end-point devices. It quickly creates and delivers crypto keys on demand, protects its secrets behind a world class “air-gap” technology, and utilizes machine learning to prevent zero-day vulnerabilities.
Read the brief > |
Cy4Secure Performance and Certification Brief |
||||
---|---|---|---|---|
Whether using the industry standard AES-256 symmetric block cipher or Bonafeyed’s innovative 800-bit stream cipher both meet National Institute of Standards and Technology (NIST) FIPS 140-2 part 1, four statistical random number generator tests. Performance is another important attribute where Cy4Secure excels ensuring users’ experience is not impacted. Review performance comparisons and certification tests.
Read the brief > |