Kryptera Technologies – Security by Design
Thursday, July 18, 2019
Tuesday, June 4, 2019
Two Great Challenges from Peter Thiel
"What great company is nobody building?"
"Tell me something true that nobody believes." - Cybercrime can be stopped in its tracks.
Friday, May 31, 2019
Kryptera Technologies Announces Secure Node Servers
The Kryptera Enterprise and Mirage product lines now fully support use as secure node servers. A new design permits rapid activation of secure node servers within a designated secure group.
Any file that is encrypted using a secure node Kryptera server within a designated group can be decrypted by any secure node server within the same group.
Kryptera secure nodes are set up using two or more secure node servers, computers or appliances, and can operate from office to office, office to field agent, office to ship, office to air, ship to ship, ship to air, ship to field agent, air to air, and air to field agent.
This includes files of any size and composition, including directories containing an unlimited number of files within sub-directories. Each encrypted file is randomly encrypted, where encrypting one file many times over would result in different, randomly unique encrypted files.
Benefits:
- Kryptera products do not require use of key management solutions.
- Kryptera products do not communicate in any way with a connected network.
- Kryptera products watch for new files and directories of files that are transferred into input queues. Once fully written to the queue, each file will automatically be encrypted or decrypted as needed, and then moved to a destination folder for pickup.
- Kryptera secure nodes can be deployed on servers, desktop and laptop computers, and small, possibly customized, appliances. Where a secure node defaults to use within a secure network, secure nodes can be customized to be used as in a stand alone mode, where files are manually moved to input queues for processing, with processed files manually moved out of destination folders.
- Transport of encrypted files between secure nodes can be handled through secure or insecure channels without posing any risk to file security.
- All processed files include extensive checks and balances within to ensure they can be fully validated on decryption.
- If anything has been changed within the encrypted file, it will not be decrypted, where faults will be logged.
- There is no limit on the number of secure nodes that can be established within a secure group.
Wednesday, March 27, 2019
Kryptera Mirage tested at CENGN
https://kryptera.ca/cengn_mirage_test.html
Our fastest server-side processing time for Kryptera Mirage was 1.63 billion bytes/second when decrypting 12 25 GB files.
Our fastest server-side processing time for the Kryptera Enterprise Server was 885.8 million bytes/second when encrypting 2,050 150 MB files.
The fastest client-server processing time Kryptera Mirage was 482.5 million bytes/second when encrypting 1,000 100 MB files.
#cybersecurity #encryption
#cybersecurity #encryption
Tuesday, March 26, 2019
Monday, March 25, 2019
Kryptera featured in Register article
https://www.theregister.co.uk/2019/03/14/quantum_encryption_debunking/
also links to the quantum encryption article on Kryptera Website
also links to the quantum encryption article on Kryptera Website
Subscribe to:
Posts (Atom)
-
"What great company is nobody building?" "Tell me something true that nobody believes." - Cybercrime can be stopped...