SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Protecting the World’s Data
(by making encryption faster, stronger, and scalable)
February 2017
The Problem
…it’s simply a
question of when
It’s not a
question of if a
data breach will
occur…
CipherLoc’s technology is designed to safeguard data
by rendering it unusable to the attacker
Our Value Proposition
 Our technology dramatically enhances data security
 CipherLoc’s patented technology provides an ironclad way to protect information
 Our innovative approach makes encryption processing faster
 Reduced latency lessens the penalty associated with deploying encryption technology
 Our solutions are scalable and future-proof
 No need to continually increase key sizes to keep pace with advances in computing horsepower
 Eliminates threats associated with quantum computing and plain-text recovery attacks
 Our products are easily deployed
 Deployment option 1: Add CipherLoc software to any existing product, application, or service
 Deployment option 2: White-label a pre-built, fully turn-key service offering(s)
Strong
Fast
Scalable
Flexible
Today’s Approach to Protecting Data: Encryption
• Traditionally, encryption technology has been used to protect data…
• However, ubiquitous use of encryption has been hampered by a number of factors:
• Encryption is slow
• Key sizes need to be continually increased (which also increases latency)
• Papers have shown that it is increasingly possible to “break” into encrypted files using
plaintext-recovery techniques
• Algorithms will be irreparably compromised when quantum computing becomes
mainstream in the near-future
Our Innovative Solution
Each message is broken into multiple fragments. Every
fragment has a unique key, a unique encryption method, are
randomly grouped into different lengths, can be further re-
encrypted. Segments are independent from each other.
• Accelerates the encryption process through multithreading
• Security improves as computing horsepower improves
• Not susceptible to plain-text recovery attacks
• Inherently resistant to quantum computing attacks
Each message is treated as a monolithic block of data;
messages are encrypted using keys; block sizes must
exactly match the size of the key
• Slow and latency increases as key sizes increase
• Costly upgrades needed to update keys & algorithms
• Susceptible to plain-text recovery attacks
• Quantum computing will irreparably compromise
We make encryption faster, stronger, and scalable
How it Works in Practice
How Encryption is Currently Performed
Seed (key)
Plaintext Ciphertext
1. Information to be protected given to encryption engine
2. Seed (key) is also provided to encryption engine
3. Entire plaintext data block converted to ciphertext
1. Information to be protected given to CipherLoc utility
2. Seed (key) is also provided to CipherLoc utility
3. Entire plaintext data block is randomly fractured
4. Seed is used generate large numbers of random keys
5. Each individual fragment is encrypted using a one-time use key and an
existing encryption algorithm (e.g. AES)
6. Fully-encrypted fragments are dispersed using TCP/IP
1
2
3
How Encryption is Enhanced with CipherLoc
Plaintext
Ciphertext
CipherLoc1
2
3
Seed (key)
4
5 6
Strong
Speed Comparison Fast
0.00
0.50
1.00
1.50
2.00
2.50
3.00
3.50
10KB 100KB 1MB 25MB 125MB 500MB 1GB
Encryption Processing Time
AES CipherLoc + AESTime (sec)
Size of Data
Our innovative approach
makes encryption
processing faster
Reduced latency lessens
the penalty associated
with deploying
encryption technology
Future-Proof
How Encryption is Currently Performed
Seed (key)
Plaintext Ciphertext
How Encryption is Made Future-Proof with CipherLoc
Plaintext
Ciphertext
CipherLoc
• Rapid advances in computing horsepower require continuous
upgrades to maintain existing security levels
• DES  3DES
• 128-bit AES  256-bit AES  512-bit AES
• Every upgrade is costly, time-consuming, and temporary
• Quantum computing, once available, will irreparably
compromise existing encryption approaches
Seed (key)
Scalable
• Security strength can be vastly improved via many easy-to-deploy techniques:
1. Randomize the types of encryption algorithms used (i.e. use additional ciphers
other than just AES)
2. Increase the number of fragments generated
3. Re-encrypt each fragment multiple times – and with different encryption
algorithms
• Even if quantum computing manages to “break” an individual fragment, no
information is obtained about the other fragments or their ordering
AES-
128
AES-
256
Two-
fish
Blow-
fish
3DES
ECC
1
2
3
Deployment Option 1: Add to Existing Service
LIBRARIES
OPERATING SYSTEMS
Mac OSWindows Linux Android IOS
Encryption (e.g. AES)
APPLICATION
Customer-defined
Existing product / application / service
Software
To/from targeted hardware platforms
(servers, PC, tablets, mobile device, etc.)
Note: this will be dependent on the customer application
LIBRARIES
Encryption (e.g. AES)
OPERATING SYSTEMS
CipherLoc
APPLICATION
Customer-defined
Existing product / application / service with CipherLoc
Software
Mac OSWindows Linux Android IOS
Adding CipherLoc…
… is as simple as
inserting code on
top of where
encryption is used
Flexible
To/from targeted hardware platforms
(servers, PC, tablets, mobile device, etc.)
Note: this will be dependent on the customer application
Deployment Option 2: Turn-Key Model
Secure Voice
CLIENT CLIENT CLIENT
Secure Storage
STORAGE
Secure Chat
CLIENT CLIENT
Secure Email
CLIENT CLIENTEMAIL
SERVER
Secure Transfer
CLIENT CLIENTSERVER
Secure Video
CLIENT CLIENT
Flexible
CipherLoc
EDGE
Product Portfolio
Data-in-motion
CipherLoc
ENTERPRISE
CipherLoc
GATEWAY
CipherLoc
SHIELD
For mobile platforms For desktop, laptop, &
tablet platforms
For server platforms For database platforms
Data-at-rest
CipherLoc protects data no matter where it is located
Summary
• Data breaches are inevitable...
 Our solutions are designed to protect an organization’s most sensitive data prior to, and in case
of, a data breach
• Encryption is hard, slow, and difficult to scale…
 CipherLoc’s innovative technology solves each of these problems
• Best of all, our technology does not require any changes in architecture
 We are simply a utility that takes existing encryption algorithms and makes them better, faster,
stronger, and scalable
CipherLoc - Protecting the World’s Data
Securing the IoT – A Proposed Framework
Praetorian Secure
February 2017
Overview
• Overarching goal is to create an IoT solution that is secure, scalable, and
easily monetized
• Framework will be defined assuming that data breaches are inevitable
 Proposal will ensure that information will be protected prior to, and in case of, a data breach
• Additional privacy/security to be achieved via layered authentication
 One-to-one pairing of data to user, multifactor authentication (if desired), capable of supporting alternate trust
models (e.g. Kerberos)
• Flexible architecture to enable monetization opportunities to be easily added
• Partnership-driven model to enable each party to focus on core strengths
Overview
Camera Thermostat Voice Assistants Security Alarms Smoke Detectors Window Sensors Wearables
Lighting Smart Meters Tags & Trackers Baby Monitors Smart Locks HVAC
GATEWAY
Processor
Local Network (Wifi, ZigBee, etc.)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
CLOUD
Analytics (opt)
Storage
Database
Messaging
AI (opt)
MOBILE WEB
Gateway & “Things”
GATEWAY
Processor
Local Network (Wifi, ZigBee, etc.)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
• IoT device-agnostic architecture
• Comprehensive data security (embedded chip-level, module-level, and/or gateway-level)
• Hardware modules to support various device and wireless interfaces (FCC pre-certified)
• IoT gateway supporting device/cloud connectivity, security, protocol translation, data filtering and processing, updating,
management, aggregation, etc.
• H/W partner to support mechanical, electrical, certifications, customizations, etc.
Cloud
• Cloud-centric architecture supporting device configuration / set-up, account / device ownership management, communication,
data collection and storage, etc.
• Comprehensive and scalable security for both data-in-motion and data-at-rest
• Strong authentication mechanisms to provide one-to-one pairing of data to user (including access control)
• Analytic systems to collect, analyze, organize, and feed data to the most relevant users
• Scalable architecture to enable future monetization options including machine learning and artificial intelligence
CLOUD
Analytics (opt)
Storage
Database
Messaging
AI (opt)
Mobile & Web
• Pre-built mobile applications to enable end users to control the connected device, connect to the cloud, etc.
• Web-based console to provide administrative control over entire IoT infrastructure
• Comprehensive and scalable security, including complete data protection and identity-based authentication
• Fully-featured IoT web management/console system supporting:
• Device management
• Monitoring & control
• Software distribution and management
• Provisioning
MOBILE WEB
• Dashboards
• Alert systems
• Permissions
• Over-the-air (OTA) communications
Putting it All Together
GATEWAY
Processor
“THINGS”
Processor
Module (opt)
CLOUD
Analytics (opt)
Storage
Database
Messaging
AI (opt)
MOBILE WEB
• Unlike other IoT architectures that start with
the IoT infrastructure and adds security
afterwards, proposed architecture is
purpose-built with security as the foundation
• Proposed architecture is device- and
protocol-agnostic
• Works equally well in both consumer and
industrial IoT applications
• Monetization opportunities can be
seamlessly added (e.g. data storage,
database management, data analytics,
machine learning, etc.)
• White-label options / customizations exist for
“things”, gateways, mobile apps
IRONCLAD DATA PROTECTION
STRONG AUTHENTICATION
COMPLETE IoT SOFTWARE FRAMEWORK
Security-Centric IoT Framework
Secure, Scalable, Flexible, Future-Proof IoT
Camera Thermostat Voice Assistants Security Alarms Smoke Detectors Window Sensors Wearables
Lighting Smart Meters Tags & Trackers Baby Monitors Smart Locks HVAC
GATEWAY
Processor
Local Network (Wifi, ZigBee, etc.)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
“THINGS”
Processor
Module (opt)
CLOUD
Analytics (opt)
Storage
Database
Messaging
AI (opt)
MOBILE WEB
Thank You
Brent A. Bernard |Direct: 248.953.3853| brent.bernard@praetoriansecure.com
Austin Ross | Office: 1.855.519.7328 | Austin.ross@praetoriansecure.com

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing SecurityCloud Genius
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network securityNEHA PATEL
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Teddy Reed
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...Shah Sheikh
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Chaitanya chandra sekhar
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assetsgocybersec
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 

Was ist angesagt? (18)

IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!Hardware, and Trust Security: Explain it like I’m 5!
Hardware, and Trust Security: Explain it like I’m 5!
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Forward unisys
Forward unisysForward unisys
Forward unisys
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health MonitorNagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
Nagios Conference 2014 - Sean Falzon - Nagios as a PC Health Monitor
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Unisys Stealth Black
Unisys Stealth BlackUnisys Stealth Black
Unisys Stealth Black
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 

Andere mochten auch

Andere mochten auch (8)

Deanslist2015
Deanslist2015Deanslist2015
Deanslist2015
 
Central Michigan University Dean's List 2016
Central Michigan University Dean's List 2016Central Michigan University Dean's List 2016
Central Michigan University Dean's List 2016
 
Firewall - Failover & Transparent Firewall
Firewall - Failover & Transparent FirewallFirewall - Failover & Transparent Firewall
Firewall - Failover & Transparent Firewall
 
PHP UK 2017 - Don't Lose Sleep - Secure Your REST
PHP UK 2017 - Don't Lose Sleep - Secure Your RESTPHP UK 2017 - Don't Lose Sleep - Secure Your REST
PHP UK 2017 - Don't Lose Sleep - Secure Your REST
 
FRONTERA DE POSIBLIDADES DE PRODUCCION
FRONTERA DE POSIBLIDADES DE PRODUCCIONFRONTERA DE POSIBLIDADES DE PRODUCCION
FRONTERA DE POSIBLIDADES DE PRODUCCION
 
3D Houses
3D Houses3D Houses
3D Houses
 
El flujo de la economía
El flujo de la economíaEl flujo de la economía
El flujo de la economía
 
ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 

Ähnlich wie Preatorian Secure partners with Cipher loc - New Encryption Technology

CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)Michael DeLaGarza
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptxMrPrathapG
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...IJSRD
 

Ähnlich wie Preatorian Secure partners with Cipher loc - New Encryption Technology (20)

CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 
CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)CipherLoc_OverviewBrochure (1)
CipherLoc_OverviewBrochure (1)
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptx
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Network security
Network securityNetwork security
Network security
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Preatorian Secure partners with Cipher loc - New Encryption Technology

  • 1. Protecting the World’s Data (by making encryption faster, stronger, and scalable) February 2017
  • 2. The Problem …it’s simply a question of when It’s not a question of if a data breach will occur… CipherLoc’s technology is designed to safeguard data by rendering it unusable to the attacker
  • 3. Our Value Proposition  Our technology dramatically enhances data security  CipherLoc’s patented technology provides an ironclad way to protect information  Our innovative approach makes encryption processing faster  Reduced latency lessens the penalty associated with deploying encryption technology  Our solutions are scalable and future-proof  No need to continually increase key sizes to keep pace with advances in computing horsepower  Eliminates threats associated with quantum computing and plain-text recovery attacks  Our products are easily deployed  Deployment option 1: Add CipherLoc software to any existing product, application, or service  Deployment option 2: White-label a pre-built, fully turn-key service offering(s) Strong Fast Scalable Flexible
  • 4. Today’s Approach to Protecting Data: Encryption • Traditionally, encryption technology has been used to protect data… • However, ubiquitous use of encryption has been hampered by a number of factors: • Encryption is slow • Key sizes need to be continually increased (which also increases latency) • Papers have shown that it is increasingly possible to “break” into encrypted files using plaintext-recovery techniques • Algorithms will be irreparably compromised when quantum computing becomes mainstream in the near-future
  • 5. Our Innovative Solution Each message is broken into multiple fragments. Every fragment has a unique key, a unique encryption method, are randomly grouped into different lengths, can be further re- encrypted. Segments are independent from each other. • Accelerates the encryption process through multithreading • Security improves as computing horsepower improves • Not susceptible to plain-text recovery attacks • Inherently resistant to quantum computing attacks Each message is treated as a monolithic block of data; messages are encrypted using keys; block sizes must exactly match the size of the key • Slow and latency increases as key sizes increase • Costly upgrades needed to update keys & algorithms • Susceptible to plain-text recovery attacks • Quantum computing will irreparably compromise We make encryption faster, stronger, and scalable
  • 6. How it Works in Practice How Encryption is Currently Performed Seed (key) Plaintext Ciphertext 1. Information to be protected given to encryption engine 2. Seed (key) is also provided to encryption engine 3. Entire plaintext data block converted to ciphertext 1. Information to be protected given to CipherLoc utility 2. Seed (key) is also provided to CipherLoc utility 3. Entire plaintext data block is randomly fractured 4. Seed is used generate large numbers of random keys 5. Each individual fragment is encrypted using a one-time use key and an existing encryption algorithm (e.g. AES) 6. Fully-encrypted fragments are dispersed using TCP/IP 1 2 3 How Encryption is Enhanced with CipherLoc Plaintext Ciphertext CipherLoc1 2 3 Seed (key) 4 5 6 Strong
  • 7. Speed Comparison Fast 0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 10KB 100KB 1MB 25MB 125MB 500MB 1GB Encryption Processing Time AES CipherLoc + AESTime (sec) Size of Data Our innovative approach makes encryption processing faster Reduced latency lessens the penalty associated with deploying encryption technology
  • 8. Future-Proof How Encryption is Currently Performed Seed (key) Plaintext Ciphertext How Encryption is Made Future-Proof with CipherLoc Plaintext Ciphertext CipherLoc • Rapid advances in computing horsepower require continuous upgrades to maintain existing security levels • DES  3DES • 128-bit AES  256-bit AES  512-bit AES • Every upgrade is costly, time-consuming, and temporary • Quantum computing, once available, will irreparably compromise existing encryption approaches Seed (key) Scalable • Security strength can be vastly improved via many easy-to-deploy techniques: 1. Randomize the types of encryption algorithms used (i.e. use additional ciphers other than just AES) 2. Increase the number of fragments generated 3. Re-encrypt each fragment multiple times – and with different encryption algorithms • Even if quantum computing manages to “break” an individual fragment, no information is obtained about the other fragments or their ordering AES- 128 AES- 256 Two- fish Blow- fish 3DES ECC 1 2 3
  • 9. Deployment Option 1: Add to Existing Service LIBRARIES OPERATING SYSTEMS Mac OSWindows Linux Android IOS Encryption (e.g. AES) APPLICATION Customer-defined Existing product / application / service Software To/from targeted hardware platforms (servers, PC, tablets, mobile device, etc.) Note: this will be dependent on the customer application LIBRARIES Encryption (e.g. AES) OPERATING SYSTEMS CipherLoc APPLICATION Customer-defined Existing product / application / service with CipherLoc Software Mac OSWindows Linux Android IOS Adding CipherLoc… … is as simple as inserting code on top of where encryption is used Flexible To/from targeted hardware platforms (servers, PC, tablets, mobile device, etc.) Note: this will be dependent on the customer application
  • 10. Deployment Option 2: Turn-Key Model Secure Voice CLIENT CLIENT CLIENT Secure Storage STORAGE Secure Chat CLIENT CLIENT Secure Email CLIENT CLIENTEMAIL SERVER Secure Transfer CLIENT CLIENTSERVER Secure Video CLIENT CLIENT Flexible
  • 11. CipherLoc EDGE Product Portfolio Data-in-motion CipherLoc ENTERPRISE CipherLoc GATEWAY CipherLoc SHIELD For mobile platforms For desktop, laptop, & tablet platforms For server platforms For database platforms Data-at-rest CipherLoc protects data no matter where it is located
  • 12. Summary • Data breaches are inevitable...  Our solutions are designed to protect an organization’s most sensitive data prior to, and in case of, a data breach • Encryption is hard, slow, and difficult to scale…  CipherLoc’s innovative technology solves each of these problems • Best of all, our technology does not require any changes in architecture  We are simply a utility that takes existing encryption algorithms and makes them better, faster, stronger, and scalable CipherLoc - Protecting the World’s Data
  • 13. Securing the IoT – A Proposed Framework Praetorian Secure February 2017
  • 14. Overview • Overarching goal is to create an IoT solution that is secure, scalable, and easily monetized • Framework will be defined assuming that data breaches are inevitable  Proposal will ensure that information will be protected prior to, and in case of, a data breach • Additional privacy/security to be achieved via layered authentication  One-to-one pairing of data to user, multifactor authentication (if desired), capable of supporting alternate trust models (e.g. Kerberos) • Flexible architecture to enable monetization opportunities to be easily added • Partnership-driven model to enable each party to focus on core strengths
  • 15. Overview Camera Thermostat Voice Assistants Security Alarms Smoke Detectors Window Sensors Wearables Lighting Smart Meters Tags & Trackers Baby Monitors Smart Locks HVAC GATEWAY Processor Local Network (Wifi, ZigBee, etc.) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) CLOUD Analytics (opt) Storage Database Messaging AI (opt) MOBILE WEB
  • 16. Gateway & “Things” GATEWAY Processor Local Network (Wifi, ZigBee, etc.) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) • IoT device-agnostic architecture • Comprehensive data security (embedded chip-level, module-level, and/or gateway-level) • Hardware modules to support various device and wireless interfaces (FCC pre-certified) • IoT gateway supporting device/cloud connectivity, security, protocol translation, data filtering and processing, updating, management, aggregation, etc. • H/W partner to support mechanical, electrical, certifications, customizations, etc.
  • 17. Cloud • Cloud-centric architecture supporting device configuration / set-up, account / device ownership management, communication, data collection and storage, etc. • Comprehensive and scalable security for both data-in-motion and data-at-rest • Strong authentication mechanisms to provide one-to-one pairing of data to user (including access control) • Analytic systems to collect, analyze, organize, and feed data to the most relevant users • Scalable architecture to enable future monetization options including machine learning and artificial intelligence CLOUD Analytics (opt) Storage Database Messaging AI (opt)
  • 18. Mobile & Web • Pre-built mobile applications to enable end users to control the connected device, connect to the cloud, etc. • Web-based console to provide administrative control over entire IoT infrastructure • Comprehensive and scalable security, including complete data protection and identity-based authentication • Fully-featured IoT web management/console system supporting: • Device management • Monitoring & control • Software distribution and management • Provisioning MOBILE WEB • Dashboards • Alert systems • Permissions • Over-the-air (OTA) communications
  • 19. Putting it All Together GATEWAY Processor “THINGS” Processor Module (opt) CLOUD Analytics (opt) Storage Database Messaging AI (opt) MOBILE WEB • Unlike other IoT architectures that start with the IoT infrastructure and adds security afterwards, proposed architecture is purpose-built with security as the foundation • Proposed architecture is device- and protocol-agnostic • Works equally well in both consumer and industrial IoT applications • Monetization opportunities can be seamlessly added (e.g. data storage, database management, data analytics, machine learning, etc.) • White-label options / customizations exist for “things”, gateways, mobile apps IRONCLAD DATA PROTECTION STRONG AUTHENTICATION COMPLETE IoT SOFTWARE FRAMEWORK Security-Centric IoT Framework
  • 20. Secure, Scalable, Flexible, Future-Proof IoT Camera Thermostat Voice Assistants Security Alarms Smoke Detectors Window Sensors Wearables Lighting Smart Meters Tags & Trackers Baby Monitors Smart Locks HVAC GATEWAY Processor Local Network (Wifi, ZigBee, etc.) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) “THINGS” Processor Module (opt) CLOUD Analytics (opt) Storage Database Messaging AI (opt) MOBILE WEB
  • 21. Thank You Brent A. Bernard |Direct: 248.953.3853| brent.bernard@praetoriansecure.com Austin Ross | Office: 1.855.519.7328 | Austin.ross@praetoriansecure.com