Home - CertainSafe

CertainSafe® Digital Vault - Advanced Cyber Security For Data At Rest And In Motion

Our award winning MicroTokenization® and MicroEncryption® technology secures data at a level never before possible. A CertainSafe Digital Vault high security cloud storage solution mitigates risk, ensures compliance and protects your reputation with your clients.

Secure Portals Available Now

HomepageWebsite_1

A Portal is a private online site where groups can share files and information.  A CertainSafe Secure Portal is an ultra-secure online site for storing, sharing and messaging in total secrecy.  

Ready-to-use sites are available for several industries, so the experience matches the business need.

CertainSafe has also made available a Personal portal for individuals and families.  

White Labeling branding to include company logos and colors is available.

 


Join Us For A Live Webinar Demonstration

Every Tuesday 12:00 pm EST  –  Every Thursday 3:00 pm EST

Registernow10

_________________________

CertainSafe Awarded PC Magazine Editor’s Choice

 Third Year In A Row “2016”

PCMAG_EditorChoice2

Absolute Data Security - The CertainSafe Digital Vault MicroTokenization and MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroTokenization

Simultaneously replace the sensitive data with CertainSafes's proprietary MicroToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

Recent Blog Posts

Tried and True: Data Encryption Still the Gold Standard for Protecting Against Hackers

Contemporary cyberthieves have a wealth of resources at their fingertips, constantly devising new ways to access sensitive — and therefore valuable — data from protected systems. In turn, organizations (and their security departments) must stay constantly ahead of the curve and ready to respond. While the ever-fluctuating nature of the digital realm makes this a tall order, one standard tactic has held true: data encryption. Data Encryption: Issue Background Encryption solves the problem of secure transmission by translating data into a format that is incomprehensible to anyone without the correct “key” to decode it. Its simplicity is the key to…Read More

Heart-Stopping Cyber Attacks

The U.S. Food and Drug Administration (FDA) opened a probe in August to investigate claims that heart devices made by St. Jude Medical, a medical device manufacturer, were defective and vulnerable to fatal cyber attacks. The FDA probe was launched following a security vulnerability report from MedSec, a cyber security research company, and Muddy Waters, a due diligence based investment firm, claiming that St. Jude’s pacemakers and defibrillators were vulnerable to cyberattacks. These attacks, according to the report, could result in battery drain or manipulations of the pacemaker beat rates, putting patient lives in jeopardy. St. Jude Medical fought back,…Read More

The Biggest Data Breaches of All Time in One Infographic

As more and more of our data is stored online, we are increasingly susceptible to data breaches that can do major damage. Breaches can occur due to a variety of methods, including hacks, configuration errors, leaks, accidental publishing, lost and stolen hardware, and poor security. Businesses and agencies of all shapes and sizes have suffered attacks, and the hackers behind them are often hunting for financial or other gains. A fantastic interactive infographic from Information is Beautiful shows the scope and timeline of these attacks, and it’s a bit shocking just how often they happen. You can find the infographic…Read More

"The CertainSafe approach to cloud security may be the most brilliant and effective that I've seen to date, in an area that is critical if Net-based commerce, applications, and transactions are to go forward."

- Mark Anderson, FiRe chair and CEO of the Strategic News Service