Remove sensitive data from its original location, manually or via automated application APIs.
Simultaneously replace the sensitive data with CertainSafes's proprietary DigiToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.
The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.
When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.For more information check out our FAQ's
You put a lot of faith in your cloud security provider. You trust that their security is better than yours. Nut how much do you really know? Here are 10 questions to ask your cloud security provider. What cloud security aspects is your business responsible for? Where does your responsibility end and where does theirs begin? Will your data be encrypted in transit and at rest? Don’t settle for general statements like “We will encrypt your data.” What security certifications does the provider possess? In addition to being certified SAS 70, CertainSafe® maintains databases in PCI DSS Level 1 Certified,…Read More
Equifax, one the three main credit reporting agencies in the country, recently disclosed that a recent data breach may have impacted as many as 143 million Americans. On September 26, Equifax CEO Richard Smith announced his retirement. Data stolen in the breach includes 209,000 credit card numbers as well as millions of names, Social Security numbers, addresses, birth dates, drivers license numbers, etc. But what may be more concerning than the hack itself is Equifax’s breach response. Poor Breach Response Compounds Hack’s Damage First, the company took 6 weeks to disclose the breach, which gave hackers ample time to use…Read More
In an age when hackers and cyber-attacks seem to be in the news every day, extraordinary attacks with greater consequences can get lost in the headlines. That seems to be exactly what happened this week when it was announced that a series of attacks not only compromised the data of US and European energy companies, but also gave the intruders actual hands-on access to power grid operations. The intruders had enough control that they could have actually induced blackouts on U.S. soil at will – disrupting not only business, but also putting lives at risk. The Attack In the spring…Read More