FAQ's Archive - CertainSafe - The Most Secure Cloud Storage Solution

CertainSafe® Digital Vault - Advanced Cyber Security For Data At Rest And In Motion

Absolute Data Security - The CertainSafe Digital Vault MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption

Simultaneously replace the sensitive data with CertainSafes's proprietary DigiToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Con't)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

Recent Blog Posts

Online File Sharing Giant Admits Failing Cloud Security Protocol

A recent admission by Dropbox that it had inadvertently retained user files for as long as seven years has raised concerns about cloud security at the online file sharing giant. A story covered by Australian news source iTnews indicates that Dropbox failed to follow its own security policies when retaining files that users of this service believed had been deleted permanently. This error could have allowed the exposure of trade secrets and confidential information transferred or stored by Dropbox users. Dropbox Blames a Glitch in its Software for Lax Cloud Security Dropbox is attributing this security failure to a glitch…Read More

Secure Portals: Communication, Collaboration, Flexibility and Yes, Security

What are secure portals, you may ask? Communication, collaboration and security rolled into one. The increased prevalence of bring-your-own-device policies in the modern workplace can present real security risks for large and small businesses alike. A recent article published in Fast Company magazine outlines the issues that may face IT departments because of these changes in the working environment. Inconsistent Security Could Spell Trouble When staff members are allowed or encouraged to bring their own laptops, tablets and other computing devices into the work environment, they also bring along a set of security issues that your IT department may not…Read More

Expanding File Sharing to Government and Other “Cloud-Fearing” Industries

As we discussed in our previous blog, the cloud-based FileShare market has exploded in recent years, drawing in millions of new users and creating new realities for how we store, share and transmit data. These new realities do come with risk, however, and those risks have kept cloud-fearing market segments – like government – from enjoying the new opportunities offered by commercial data storage and file sharing services. Thus, as we are told by sources “in the know,” the majority of data storage and file sharing in government is near archaic in their methodologies. Government agencies and departments represent the…Read More