Securing your Data, Always and Everywhere

CyOS guarantees constant data encryption, leaving you always in control of your data

CyVolve has created a unique, sophisticated and patented keying algorithm that provides tremendous control over data. Where other products protect the network, CyVolve protects the data at the data level. Therefore we make all network, cloud, and IoT infrastructures a commodity, as all data created, stored, or shared through CyOS is constantly and securely encrypted at rest and only accessible when permission has been granted.

Traditional System

The traditional model of data security relies on the Network and Operating Systems

Typically, the only additional security layers are within a database, if one exists. However, in all cases that security stays within the domain even when the data leaves. This is felt most painfully when data is removed and can then be examined without restriction by hackers.

The graphic explains what happens to data in the traditional model, when all Network and Operating System security has been breached.

CyOS System

CyVolve reverses the traditional model of Network and Operating System security

CyVolve puts all of the security around the data at file level. By securing the data at this level, CyVolve is able to provide pervasive and persistent data security wherever that data goes, even across domain boundaries – whilst maintaining full control of who is able to access the data.

The graphic explains what happens when the CyVolve Ecosystem is deployed. Even if intruders were to breach the network defenses, the data would be useless as it remains fully encrypted even at rest.

Key Encryption for Complete Data Control

Control Data Security, Access & Audit At Every Level with Master Key Technology

For the first time, CyVolve introduces a true “ZERO-KNOWLEDGE” system. Only the data owners or data managers have access to the data. All system administrators and vendors can manage the infrastructure but no longer have access to the data itself. That includes CyVolve; it is mathematically verifiable that at no point can CyVolve gain access to the client’s data.

Any data that the client puts into their own domain, somebody else’s domain, or the cloud, remains encrypted at rest, in transit and on the endpoint. So the administrators within the cloud infrastructure no longer have access to the client’s data.

The operational managers and the board who have total responsibility for the security of their data, now have full confidence in the management and visibility of the data. They no longer have to hope because they know.

Client-side encryption protects data before transmission

Client-Side Data Encryption is an important component of our “Zero-Knowledge” guarantee. It means our server has “Zero-Knowledge” of what your data is, as it is always encrypted on your device before it comes to us. We never store or have access to plain text data, ensuring total privacy and confidentiality. Running across all platforms including Microsoft Windows, Apple MacOS, Apple IOS, Linux, and Android, CyOS ensures total data security by performing Client-Side Data Encryption and Decryption along with User Authentication.

Files encrypted individually for complete access control

Every secured data resource, whether it is files or messages, has a unique encryption key, and is encrypted using advanced cryptography protocols. Using this type of encryption ensures that if one key is compromised, then only that single resource that was encrypted with it will be compromised.

Encryption keys reside with the user and not the data

Unless you are the only one holding the keys to your data, encryption is meaningless. Our whole system is built entirely on the premise that you, and only you, have the keys to your data. Since your keys are never transmitted to CyVolve in their original form, this means that not even we can access or view your data.

Don’t get boxed in with your cyber security

Our revolutionary data security ecosystem provides Enterprise and Government clients with the ability to protect their data wherever it travels or resides; for complete control of their data across domains.

Key Features & Benefits

Data can never be considered secure if many people have access to your keys

The essence of total data security is to own and control your own encryption keys. CyVolve ensures “Zero-Knowledge” privacy by enforcing this through the unique architecture of the system. No one, without your express permission can access or view your information including CyVolve staff, or anyone with access to your private or public network.

image

Keys Under User
Control at ALL times

Our whole system is built entirely on the premise that you, and only you, have the keys to your data.

image

Advanced
Encryption Protocols

Every secured data resource has a unique encryption key, and is encrypted using advanced cryptography protocols.

image

Separate Key
Transportation

Even if data is encrypted during transit or storage, many data security companies store your encryption keys with your data.

image

Zero-Knowledge
Data Centers

No one, without your express permission can access or view your information including staff or network administrators.

Enduring Access and Permissions Control

CyOS maintains constant and persistent control over access to all data and permissions

CyOS data managers maintain constant and persistent control over access to all data and over permissions granted to view data, with the ability to not only grant or revoke access at anytime but grant or restrict access to specific parts of a document or data file.

Control Who has Access to What, Where, When and How

CyVolve uses dozens of factors to control security to ensure persistent data control

Because the level of access is based on the rights of the recipient, streams of volumes of data can be sent ‘downstream’ to multiple recipients (in parallel or in serial) and the recipient can only access as much of that data as they have permissions for, granted by the data owner. In addition to the usual tokens for MAC, IP, Login, etc., CyOS can include any systems the client is using such as Federated ID, Two-factor authentication, Biometrics, rotating codes and more.

Feedback User Behavior to Manage Access Rights

Revoke access rights across all files, wherever they are stored to ensure persistent data control

The Behavioral Analytics Module monitors data usage in real-time and feeds this back to the Identity Management Module (IDMM). The IDMM uses that information as yet another token of identity analysis and can be configured for alerting and risk-mitigation. All the above authentication methods are ‘passive’ tokens, but we also have an ‘active’ token which is the learning feedback loop. So we’re not only tracking “something you have, something you know and something you are”, we’re also tracking “something you do”.

Immediately Revoke User Access to the System

Eliminate the risk of simple password protected resources by using combinations of tokens

Many organizations struggle with the issues of managing security when staff members leave their jobs. Data can be spread across many devices, online file storage systems and backups. CyVolve provides a single point to revoke access rights across all files, wherever they are stored, even if the data resides on the member of staff’s own personal devices

Wherever data is stored, in the cloud, on laptops, a USB drive, a backup disk or someone else’s computer, only you, and those you authorize, can view the contents of those files. CyOS will give you complete peace of mind since it will provide you with a level of unmatched security that makes the traditional methods of securing a file system almost irrelevant..

Only user can access data or grant & revoke permissions

Because the encryption keys stay with the user, we truly offer “Zero-Knowledge” privacy. Since we never have access to your keys, your data is never at risk of being unlocked, stolen or misused, either by internal threats or external attacks. You are the only one who can unlock your data: not a hacker, not our staff, in fact no one. If a user attempts to access files more often than approved, you will be notified immediately.

Each file is encrypted individually, giving user full control

Each encrypted file is in essence its own file system, with its own permissions and security. These files will always remain impenetrable unless you have expressly granted permission to another person to specifically view that file.

Quickly disable user access across all devices and networks

If there are signs of malicious intent, we offer a kill button that will immediately revoke user access to the system. This way you don’t have to worry about an employee going rogue and misusing your valuable data.

Don’t get boxed in with your cyber security

Our revolutionary data security ecosystem provides Enterprise and Government clients with the ability to protect their data wherever it travels or resides; for complete control of their data across domains.

Key Features & Benefits

Usernames and passwords are no longer sufficient protection against cyber attacks

Our system ensures that the person accessing the data is who they say they are, even if their username and password are stolen. This is due to our multi-dimensional approach to managing access control permissions that incorporate dozens of authentication tokens to provide pervasive data security.

image

Apply appropriate
access levels to users

image

Quickly grant or
revoke access

image

Always know who has
access to data

image

Granular encryption
over each piece of data

Sustained auditing Across all Platforms

Our audit is protected by CyOS and is ‘read-only’, therefore tamperproof and irrefutable

All compliance, usage and non-usage (we track negatives by default) reports fall out of the audit module automatically. CyOS triangulates and controls access based on the data, user, and device all over time. More importantly, the audit module is also the foundation for the User Behavior Analytics Module.

Data Reporting Facility

Quickly identify any data misuse and run detailed audit reports

Our intuitive Data Reporting interface provides you with a tamper-proof audit trail to quickly view how each member of your firm is accessing and utilizing files, including external users who have access. See who is doing what, or who is not doing anything at all.

Not sure who made the last change to a document, or who is working on it now? Not an issue. Our simple-to-use console will show you the status of your files.

Track User Activity at All Times

Monitor, restrict and revoke access to your data at any time

The unique Data Reporting facility built into CyOS will quickly identify all data a user has ever accessed, and when the data was read, edited, deleted, shared or downloaded, providing invaluable insight for the management team.

When you share information, security levels and permissions you have applied for that user travel with your data. You can revoke those permissions or change them at any time. You can also view audit logs on how your data is being used across any platform and any network. You remain in control at all times.

Full visibility to the end

Maintains full audit trail from cradle to grave across multiple destinations

Because the level of access is based on the rights of the recipient, streams of volumes of data can be sent ‘downstream’ to multiple recipients (in parallel or in serial) and the recipient can only access as much of that data as they have permissions for, granted by the data owner.

Therefore, all data movement, from the data perspective, must be fully audited and reported back to the data owner.

Track when attachments are opened or forwarded

We give you the power to track when your attachments are opened or forwarded, or even prevent forwarding and copying. Since our platform is built from the ground up, our email security works with Gmail, Outlook and all other providers.

Control is with the data itself independent of any network

Control has been migrated from the network to the data itself independent of any network.

Triangulate data access and use

Data usage must be triangulated against the device, the user and time.

Don’t get boxed in with your cyber security

Our revolutionary data security ecosystem provides Enterprise and Government clients with the ability to protect their data wherever it travels or resides; for complete control of their data across domains.

Key Features & Benefits

We give you the power to track when your attachments are opened or forwarded

True data security should have no boundaries. This is why we provide you with security that always travels with your data, even after it leaves your possession. Email and attachments can be recalled regardless of where they are sent and even after they have been read.

image

Simple to use console

image

Full tamper-proof audit trail

image

Automatic alerts detect misuse or unusual behavior

image

Set limits to automatically protect data

Pervasive AI Monitoring & Threat Response

CyOS artificial intelligence works to constantly educate itself on the habits of users

Monitor, Learn, React is the basis of how CyOS’s artificial intelligence works to constantly educate itself on the habits of users within a system in order to discern when unusual activity takes place and take appropriate action either through alerting administrators or taking direct action in ending the potential data breech.

Activity Monitoring

The Behavioral Analytics Module monitors data usage in real-time

At the heart of Artificial Intelligence (AI) is a learning machine that can ‘intelligently’ derive actions from feedback gained from past histories of successes or failures. When detecting an anomaly, AI can investigate the access pattern directly, very much like human intervention would.

This automated process will only contact a human manager when a suspicion threshold is met – ensuring access to data is not interrupted for legitimate use.

CyOS System

Insider threats are significantly reduced by restricting user access

Threats to your data do not only exist outside of your company. Sometimes the threats reside within. We give you the power to quickly grant and revoke access to your valuable files. If a user attempts to access files more often than approved, you will be notified immediately.

If there are signs of malicious intent, we offer a kill button, which immediately revokes a user’s access to the system. This way you don’t have to worry about an employee going rogue and misusing your valuable data.

Taking Action Before It’s Too Late

Tamperproof auditing and tracking of the files on a system makes it possible to easily identify misuse

Far too often – data breaches are discovered too late – once all the damage has been done. It’s true that if companies employ all the best practices and security measures, data breaches become significantly less likely. However, security is a battlefield it’s best to stay on the front foot of. Hence, having the means to quickly identify a breach and subsequently limit its damage is a great tool to have.

Organizations need a system that detects abnormal activity as it’s happening. If a company can identify the issue early – it can minimize the damage quickly – rather than reacting months after the act.

Learn

CyOS actually learns a user’s behavior pattern and notices if a user is accessing or using files in an uncharacteristic way. Settings can be customized at the domain, department, role or user level.

Monitor

CyOS monitors user behavior, creating guidelines that can be fine-tuned based on activity by job role, calendar events, etc. Detailed, tamper-proof audit trails are created even for admins – nothing is invisible.

Alert

Alerts are immediately sent if CyOS detects unusual activity. Overrides and circumvention are impossible.

React

System responses can be fully automated with no requirement for human intervention. CyOS is able to scramble a user’s keys, revoke access and shut the account down.

Don’t get boxed in with your cyber security

Our revolutionary data security ecosystem provides Enterprise and Government clients with the ability to protect their data wherever it travels or resides; for complete control of their data across domains.

Key Features & Benefits

CyOS ‘learns’ system wide behavior patterns and can be configured for alerting and risk-mitigation

In addition to learning, a baseline of acceptable (or non-acceptable) behaviors can be programmed into CyOS in advance.  This provides a “best of both worlds” approach that allows our clients to dramatically benefit from an improved security stance literally from day 1.

image

Fully automated with no human intervention

image

Create guidelines based on activity

image

Automatic alerts detect misuse or unusual behavior

image

Set limits to automatically protect data