CertainSafe® Digital Vault - Advanced Cyber Security For Data At Rest And In Motion

Our award winning MicroTokenization® and MicroEncryption® technology secures data at a level never before possible. A CertainSafe Digital Vault high security cloud storage solution mitigates risk, ensures compliance and protects your reputation with your clients.

Join Us For A Live Webinar Demonstration

Every Tuesday 12:00 pm EST  –  Every Thursday 3:00 pm EST



CertainSafe Awarded PC Magazine Editor’s Choice

 Third Year In A Row “2016”



Take Your 30 Day Free Trial Today!

Never worry about the security of your files again. Start your Digital Safety Deposit Box 30 Day Free Trial and experience the industry leading approach to securing your sensitive data all from the ease of your internet browser!

Absolute Data Security - The CertainSafe Digital Vault MicroTokenization and MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroTokenization

Simultaneously replace the sensitive data with CertainSafes's proprietary MicroToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

Recent Blog Posts

The Biggest Data Breaches of All Time in One Infographic

As more and more of our data is stored online, we are increasingly susceptible to data breaches that can do major damage. Breaches can occur due to a variety of methods, including hacks, configuration errors, leaks, accidental publishing, lost and stolen hardware, and poor security. Businesses and agencies of all shapes and sizes have suffered attacks, and the hackers behind them are often hunting for financial or other gains. A fantastic interactive infographic from Information is Beautiful shows the scope and timeline of these attacks, and it’s a bit shocking just how often they happen. You can find the infographic…Read More

New Cybersecurity Legislation for Insurers Now Open for Public Comment

Insurance companies are often prime targets for hackers due to the massive amount of sensitive — and thus valuable — information that flows through their servers every day. Moreover, outdated or ineffective cybersecurity measures throughout the industry make it even easier for thieves to access company data structures. Why Insurance Companies Need Cybersecurity Stolen credit card information is the typical currency of darknet trading, but personal details are far longer-lasting and more valuable. A “kited” credit card can simply be canceled, but it’s not so easy to obtain a new Social Security number, permanent address, or date of birth. Depending…Read More

Retail Cybersecurity, Point-of-Sale Breaches, and Customer Loyalty

An August 2016 report from global audit firm KPMG brings important news for payment platform operators and retailers alike. In an ever-changing digital world, businesses cannot afford to play fast and loose with sensitive information: American consumers are paying attention.   Retail Cybersecurity: The Survey   19% of survey respondents indicated that they would abandon any retailer that had been the victim of a successful data breach, even if the company took steps to remediate the damage. An additional 33% said that they would avoid shopping at an affected retailer for at least three months.   Skepticism also exists around…Read More

"The CertainSafe approach to cloud security may be the most brilliant and effective that I've seen to date, in an area that is critical if Net-based commerce, applications, and transactions are to go forward."

- Mark Anderson, FiRe chair and CEO of the Strategic News Service