Cy4Secure Arbiter Datasheet |
Data Security Gateway Datasheet |
Software Development Kit Datasheet |
||
---|---|---|---|---|
Cy4Secure [ sahy-fer si-kyoor ] or “CSA” is the backbone of Bonafeyed’s data defined security technology and responsible for authenticating users, and creating, suppling and safeguarding 800-bit and 256-bit cryptographic keys. It is available as a cloud service or software license.
Read the datasheet > |
Bonafeyed’s Data Security Gateway or “DSX” can be leveraged to integrate legacy software or devices or as the fastest no-code adoption path to Bonafeyed’s data define security solution. DSX is deployed in a cluster of 3 or more instances depending on the number of users and applications.
Read the datasheet > |
Bonafeyed’s SDK allow developers to add transparent no-touch data protection to their applications, webApps or dataApps.
Read the datasheet > |
Data Defined Security Brief |
Data-In-Use Protection Brief |
Data Security Domain Brief |
||||||||
---|---|---|---|---|---|---|---|---|---|---|
Bonafeyed views data security holistically. Our “Data Defined Security” approach ensure the customer’s data is never touched by Bonafeyed, data and decryption keys only converge on authorized devices. Data is individually encrypted requiring many keys to access a single data record and operates with existing applications and deployments.
Read the Brief > |
Advances in data security has predominantly occurred for “data-in-transit” and “data-at-rest”. Bonafeyed gives unparalleled “data-in-use” protection for databases. This means databases or applications backed by databases are given the ability to operate and query encrypted data without changes to the DBMS or its infrastructure. Learn how Cy4Secure allows full relational operations on database management systems.
Read the brief > |
Once protected data leaves the owner’s security or network domain, they effectively lose control of the data. Typically, data is delivered in the clear or as plain text on the end-point machines from an application. Bonafeyed, allows encrypted data to remain protected as it traverses different domains or users but still gives full control to accessibility by the owner. Learn how we safeguard data after it leaves the application’s domain.
Read the brief > |
||||||||
|
|
|
Cy4Secure Performance and Certification Brief |
||||
---|---|---|---|---|
Whether using the industry standard AES-256 symmetric block cipher or Bonafeyed’s innovative 800-bit stream cipher both meet National Institute of Standards and Technology (NIST) FIPS 140-2 part 1, four statistical random number generator tests. Performance is another important attribute where Cy4Secure excels ensuring users’ experience is not impacted. Review performance comparisons and certification tests.
Read the brief > |
Exceed Data Privacy Regulations |
Secure 3rd party Database backed SaaS Applications |
Protecting Live Databases |
||
---|---|---|---|---|
General Data Protection Regulation (GDPR) is nearing its third enforcing anniversary. The European Union blazed the trail of data privacy and now has become a model for many governments. What is common between these regulations is requirements to protect personal information (PII) that identifies a person. They also require this information to be controlled and protected. The ability to tightly manage who has access to PII records and encrypt individual fields of a PII record, gives Cy4Secure unmatched data protection. A single record can take dozens of cipher keys to decrypt. Breached or stolen data only provides cybercriminals with unintelligible digital data. Learn how Bonafeyed’s approach exceeds data privacy mandates and regulations.
Read the application brief > |
A dataApp is a cloud application backed by a database. Software as a service applications such as Enterprise Resource Planning (ERP), Customer Relations Management (CRM), Human Resource management (HRM), and Service Desk Management, are essentially dataApps running on top of a database. It is this fact that allows Cy4Secure to encrypt and protect data stored and searched in the cloud. External, insider, and accidental breaches of this data can now be protected and controlled by the owner.
Read the application brief > |
Fundamentally a database only knows data in its digital form. It does not know the difference if the data is English, German, French or Italian. However, queries must be in the same language for which is stored in the database. This is the basic concept that allows Bonafeyed to encrypt data fields and make them searchable. Read why protecting a database from the inside out is the most effective approach to preventing unauthorized access down to a single record or field.
Read the application brief > |
Demonetize Breached Data |
Stop Data Leakage |
|||
---|---|---|---|---|
Databases that have been breached by cybercriminals provide at least two means to extort compensation from the afflicted business. Ransomware is the first opportunity. But even after the enterprising criminals give the victims back control of their computing environment, the real prize is the database. The Dark Web now commonly posts 1000’s of databases for sale to the highest bidder. If the data is encrypted within the database, cybercriminals will see this and move on to those enterprises that have not deployed Cy4Secure. Read more about how this is a growing trend and how it can cost twice as much to recover from a breach.
Read the application brief > |
Data being revealed accidentally or made easily available to cybercriminals without effort is known as a data leak and is generally the result from poor data security. Alternate solutions that mask or tokenize data just eliminate information from databases making them useless for analytics. Encrypting sensitive data in place protects data from leaks while allowing full informational data analysis and searchability.
Read the application brief > |
Safeguarding FinTech Operations |
Surpass HIPAA and PHI Data Privacy Requirements |
Manufacturing Supply-Chain Data Protection |
|||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
US operating requirements related to financial activities have been regulated since 1933 and modernize in 1999. Privacy is mandatory and governs the collection, disclosure, and protection of consumers' personally identifiable information or PII. Financial Technology or FinTech advances financial services by using modern technologies to replace or enhance traditional financial systems. This also requires customer information shared between services, agents, and partners to be protected and controlled. Learn how Cy4Secure can be the catalyst to safeguarding data services and operations in the FinTech business model.
Read the market use case > |
HIPAA or the Health Insurance Portability and Accountability Act of 1996 is a US federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. From this, the US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule. Learn how Cy4Secure protects patient’s data when shared between medical professionals, following a breach, and amongst business services.
Read the market use case > |
An efficient and successful supply chain collaborates 100’s to 1000’s of partners. Accessibility to centralized ERP systems is the catalyst for fast communications and coordination. But it also opens the opportunity for unintentional and unlawful data exposures. Bonafeyed’s data defined security approach gives manufactures the ability to share critical protected data on the cloud from database backed applications and between its partners and suppliers without losing security controls. Read how suppliers and sub-contractors are a target for cybercriminals and how ERP systems can be protected by Bonafeyed.
Read the market use case > |
|||||||||
|
|
|
Adopting a Data-Defined Approach |
Classic database protection gives a False Sense of Security |
|||
---|---|---|---|---|
Comprehensive data protection entails examining the use and lifecycle of data. Today’s cybersecurity solutions offer a myriad of perimeter-based technologies that strive to block cybercriminals’ access to the systems holding the valuable data. In other words, as long as data remains in the same security domain and access credentials are not stolen, a business’ data assets remain secure. Proof seen in the daily news on data breaches is evidence a more complete data security approach is needed. Bonafeyed’s “Data-Defined Security” is based on a philosophy of protecting data from creation, while in use, in transit, at rest, and when shared. Read how adopting this technology ensures data protection beyond a business classic security boundary.
Read the datasheet > |
The business of data security is traditionally built on a combination of data-in-transit and data-at-rest protection technologies. For databases, this means using SSL or TLS transport protocols to protect data inflight or Transparent Data Encryption, TDE, for data placed in non-volatile storage. The only problem is that data remains in the clear or plain text when unauthorized queries are made to a DBMS. In other words, neither of these approaches stops data breaches and gives data owners a false sense of security. Bonafeyed approach protects data! Not systems that uses it ensuring its security and access control no matter where it resides.
Read the datasheet > |