Friday, May 31, 2019

Kryptera Technologies Announces Secure Node Servers

The Kryptera Enterprise and Mirage product lines now fully support use as secure node servers. A new design permits rapid activation of secure node servers within a designated secure group.

Any file that is encrypted using a secure node Kryptera server within a designated group can be decrypted by any secure node server within the same group. 

Kryptera secure nodes are set up using two or more secure node servers, computers or appliances, and can operate from office to office, office to field agent, office to ship, office to air, ship to ship, ship to air, ship to field agent, air to air, and air to field agent.

This includes files of any size and composition, including directories containing an unlimited number of files within sub-directories. Each encrypted file is randomly encrypted, where encrypting one file many times over would result in different, randomly unique encrypted files.
Benefits:

  1. Kryptera products do not require use of key management solutions.
  2. Kryptera products do not communicate in any way with a connected network.
  3. Kryptera products watch for new files and directories of files that are transferred into input queues. Once fully written to the queue, each file will automatically be encrypted or decrypted as needed, and then moved to a destination folder for pickup.
  4. Kryptera secure nodes can be deployed on servers, desktop and laptop computers, and small, possibly customized, appliances. Where a secure node defaults to use within a secure network, secure nodes can be customized to be used as in a stand alone mode, where files are manually moved to input queues for processing, with processed files manually moved out of destination folders.
  5. Transport of encrypted files between secure nodes can be handled through secure or insecure channels without posing any risk to file security. 
  6. All processed files include extensive checks and balances within to ensure they can be fully validated on decryption. 
  7. If anything has been changed within the encrypted file, it will not be decrypted, where faults will be logged.
  8. There is no limit on the number of secure nodes that can be established within a secure group.