CertainSafe® Digital Safety Deposit Box
Ultra-Secure Cyber Security For Sensitive Files

Absolute Data Security - The CertainSafe Digital Vault MicroEncryption Technology Overview

Step 1: Upload

Remove sensitive data from its original location, manually or via automated application APIs.

Step 2: MicroEncryption

Simultaneously replace the sensitive data with CertainSafes's proprietary MicroToken™ placeholders. Your storage system now only contains a virtual representation of the original data, and the sensitive data is securely transferred to our cloud.

Step 3: MicroEncryption (Con't)

The removed data is immediately encrypted using AES256 with key pairs and a unique compound key for each data object, providing unsurpassed security. Encrypted files are broken into pieces and distributed across multiple physical and virtual locations. Data uploaded to our system is never saved in unencrypted form at any time.

Step 4: Retrieval

When retrieval is required, files are unencrypted and de-tokenized, reassembled and returned in real-time to whatever application requires the information for processing. Whole files can be returned or specific data objects curated for batch processing. Retrieval is blazingly fast.

For more information check out our FAQ's

Recent Blog Posts

5 Biggest Cybersecurity Threats of 2019

It’s a fact that cybersecurity is becoming one of the most crucial issues people and companies are facing over the last few years. Data breaches are more frequent and more sophisticated as time passes. There is no sign that 2019 might be better. On the contrary, hackers and cybersecurity threats are just evolving. Even if you

7 Cybersecurity tips for holidays

The holidays are just around the corner! During this time, many individuals are busy making plans for relaxation and quality time with friends and family. However, those plans don

3 Cybersecurity Best Practices Your Firm Needs to Protect Your Clients’ Data

Data breaches aren’t a new and unknown topic. Hackers are still doing their work and trying to gain access to different pieces of information such as personal data, social security numbers, credit card numbers or other personal information. In 2017, cybersecurity threats were escalating. By 2018, we have seen an evolution of the cybercrime landscape. Humans are becoming less needed for cyber-attacks to happen due to creating of cryptoworms, for instance. Cryptoworms and other cyber tactics are the biggest cybersecurity threats and the need to protect your client’s data is intensifying each day. If your company is still inadequately…Read More



We appreciate you contacting us!

We'll do our best to answer your question quickly. In the meantime, you can check out the Step-by-Step Tutorial and the latest News on CertainSafe’s Digital Safety Deposit Box.

Have a great day ahead!