FAQ's Archive - CertainSafe - The Most Secure Cloud Storage Solution

CertainSafe® Digital Safety Deposit Box
Ultra-Secure Cyber Security For Sensitive Files

Absolute Data Security - The CertainSafe Digital Vault MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption

Simultaneously replace the sensitive data with CertainSafes's proprietary DigiToken placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Con't)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

Recent Blog Posts

Cybersecurity Incidents Double in 2017; More on the way?

Cybersecurity incidents doubled in 2017 compared to the previous year, from 82,000 incidents in 2016 to an roughly 160,000 in 2017, marking the worst ever year for data breaches.   Why the sudden and dramatic rise in cybersecurity incidents? Ransomware, experts at the Online Trust Alliance say, which accounted for an estimated 134,000 of the attacks, or 83 percent. Because many data breaches go unreported, especially ransomware attacks, the total number of cybersecurity incidents could actually be much higher. The most dramatic cybersecurity incidents, like the infamous WannaCry attack, infected over 300,000 devices across 150 countries. The cost of a…Read More

Can the Private Sector meet the Government’s Cybersecurity Needs?

The government’s cybersecurity needs can’t be understated. Unfortunately, according to many government IT workers, those needs are not being met by the private sector. The history of cooperation between the private and public sector is long. The U.S. military, as the most obvious example, relies on close partnerships with companies like Boeing, Raytheon, and Lockheed Martin to create equipment, vehicles and technology that allow them to do their job: protect the country. Cybersecurity companies hoping to serve the government must take a closer look at the specialized needs of the agencies they target, such as ensuring that their technology is…Read More

Realtor Cybersecurity Checklist: Best Practices in an Industry at Risk

Real estate transactions are just the latest favorite target of cyber criminals looking to exploit and profit off of U.S. businesses’ weak points. Besides the costs associated with a large scale data breach, a single data breach can have a devastating impact on a Realtor®’s reputation. Here are recommendations to keep you and your clients’ information safe and secure. Realtor Cybersecurity Best Practices Email and Password Security Encrypt your communications, preferably through a secure document-sharing program like CertainSafe’s Secure Portal. Do not click on attachments or links in mysterious or untrustworthy emails; you maybe downloading malware; Closely guard login information…Read More

""

-