Keyavi Self-protecting Data Product Demo

FESCH.TV INFORMIERT:

Senior Cybersecurity Analyst Celine Gravelines demonstrates Keyavi’s groundbreaking technology that makes data self-protecting, intelligent and self-aware. Learn more:

Our technology embeds protections and intelligence into the data itself, right at the data level. This means that all the protections that I’ll be showing you are done by the data, so it’s not reliant on any secondary systems, not reliant on any hardware or cloud or storage devices so you can start to imagine what type of shift this would mean for your own data security. Now, with our technology, your data can leave your possession but remain completely under your control, no matter where it goes or who has it, forever. At inception, we intentionally designed self-protecting data to be an API platform. This means that the intelligent technology can be integrated into virtually any software. For example, when we get to our forensics information later on in this demo, you’ll see how this could easily tie into a SIM solution or a security information and event management system, so the possible applications of this technology are truly limitless. But what I’m going to show you first is our agent, which is the interface we developed to interact with our API platform. This is based on how we expect most of our users to primarily be using this technology. It’s universally deployable, and it houses some of the core out-of-the-box feature sets that you could use after a quick 30-second install. The other primary design feature that we’ve been focused on as we’ve built out our self-protecting data is to make sure that it’s easy-to-use. We understand that even the most elegant security solutions will be circumvented if they’re too cumbersome, so we put significant thought into engineering an intuitive user-friendly platform and will continue to stay on that mission to make it so seamless to use. What you see on the screen is the lightweight Keyavi agent. It’s down in the status bar, and in here are several different functions that you can access directly from the client. We also made it interface into the file system, as well. Using the technology is as simple as right clicking on the file and selecting „Encrypt with Keyavi,“ and then allowing for certain authorizations to create your smart file. We also integrate it into Microsoft Office, so you can create or open smart files in Outlook, Word, PowerPoint, and Excel. A significant security concern that organizations face when considering to implement new technology is how that tech company is using or storing their sensitive data, and that leads me to one of our key differentiators – we build the entire encryption and protection process right onto the device, eliminating the need to have your data stored on our infrastructure. So we do not send, receive, or store your data in any way. Your data stays on your devices, while all the encryption and decryption happens on your device, and at the same time, you retain all the original files, as well. And lastly, because we’re embedding the protections directly into your files, it doesn’t matter if your data is shared via email or USB or any other method, the protection mechanisms travel with the data at all times, making it truly transport agnostic. The first thing I’m going to do is register my location. With COVID-19, I’m working remotely right now, along with so many others around the world, so this allows me to protect my data even when I’m outside of the typical organizational infrastructure. The very simple act of registering my location sets the geofence around me, meaning that any file I create will be geo-specific to me in my office and no one else can access it elsewhere, unless I authorize them to do so. Then I simply click „encrypt,“ and we’ve created our first smart file. This data can then be shared in any method just like normal through email, putting it in some cloud storage platform like OneDrive, or Dropbox, or on a USB flash drive. Next, I’d like to walk through how we’ve integrated with Outlook. We know that in corporate environments emailing is the primary method of data sharing, so we want to make it as seamless as possible. All I need to do is create a new email just like normal, write my message, and attach a file if I want to. Then the email itself, as well as the file attachments, are protected and only authorized for access by whoever you’re sending the email to. I just select the email and click the „Keyavi Decrypt“ button in background. It’s checking for all the factors and parameters to make sure that I am the authorized recipient, in the authorized location, and so on. Once that’s quickly verified, it opens to read like a regular email. A really nice benefit of encrypting these emails in this way is that it prevents one of the most common methods of insider threat. When an employee is a flight risk and planning on leaving an organization, about 80 percent, if not more, try to take their emails with them.







Deinen Freunden empfehlen:
FESCH.TV