The CertainSafe Digital Vault
MicroEncryption Technology Overview

Our Digital Vault is the most secure storage service available today. It is the engine that drives CertainSafe's award winning next generation data security solutions considered the premier technology to protect data against a breach. Our proprietary MicroEncryption® engines provide multiple layers of security, presenting an industry leading approach to secure sensitive data. All CertainSafe solutions utilize the Digital Vault engine.

MicroEncryption

The first step in the MicroEncryption process, initially replaces any size file or data element with a soft token, a unique mathematically generated key that serves as a placeholder for original data. DigiTokens are used to retrieve data from encrypted storage, or to enable secure online transactions without exposing source data to fraud and data theft.

MicroEncryption

During step two in the MicroEncryption process, encrypted data is broken apart into many segments, and the individualized segments, are then stored as individualized encrypted file elements in different physical locations. Records in a database can be MicroEncrypted one field at a time, while being protected separately, ensuring that each and every piece of sensitive data is individually protected, with zero possibility of a mass breach.

Digital Vault Process Steps

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption Begins

Simultaneously replace the sensitive data with CertainSafes's proprietary DigiToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Continued)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

CertainSafe is in the business to protect because we care about your customers, employees, processes and technology as much as you do. We provide organizations and individuals with technology, services, and education to offer a solution to mitigate risks and protect their reputation and assets. We utilize a PCI Level 1 DSS Certified process to make security quick and painless.