What are you looking for ?
Infinidat
Articles_top

From Extenua, End-to-End Storage Security Automated Dynamic Encryption Key Management System

Providing automated dynamic and stateless encryption key management in response to critical industry needs which are facing ever increasing massive and destructive cyber-attacks

Extenua Inc. announces its End-to-End Storage Security (ETESS) providing automated dynamic and stateless encryption key management in response to the critical industry needs which are facing increasing massive and destructive cyber-attacks.

With ETESS dynamic key management encryption keys are generated in RAM at the precise moment they are needed and only remain there until the data is encrypted or decrypted. The key is then wiped clean from RAM with a DoD secure erasure algorithm. No key is stored anywhere which is instrumental in defeating many of the common cybersecurity vulnerabilities known to exist with traditional static key management systems.

ETESS takes security to an additional level by slicing data in to smaller fragments, stripping it of all metadata and encrypting each chunk of data with a unique encryption key. These encrypted chunks of data are then scattered around in random directories that reside in many locations to ensure against even brute force attacks, government snooping or FISA warrants served to your cloud service provider.

ETESS is a product feature built into the company’s Cloud2Drive and SaferNAS products. The products are software-only solutions that present cloud object storage as virtual network drives on Windows OS, Windows Server with NAS or as folders with Android or iOS devices. You have unlimited amounts of secure storage available on demand and you may utilize any cloud vendors’ object-based storage such as Amazon S3, Microsoft Azure Blob storage, IBM Cloud object storage or any OpenStack standard cloud object-based storage.

Cloud2Drive ETESS and SaferNAS enable unlimited scalability of cloud object-based storage on-demand for today’s hybrid cloud architectures.

Further, there is no complexity or single point of failure – no VPNs, no gateways, no proxy, no-bottlenecks.

  • ETESS is not susceptible to common successful attacks such as man-in-the-middle MIattacks

  • It is not susceptible to endpoint attacks which steal a stored encryption key

  • It never allows the actual encryption keys to be stored anywhere.

  • It generates keys and destroys keys dynamically in RAM at the moment the key is needed to encrypt or decrypt the chunk or slice of the data

  • It generated encryption keys are always generated at the end node for absolute control

  • It is generating many unique keys developed based on a set of rules and circumstances that trigger a specific transformation of the random pool

  • ETESS uses Eliptic Curve Diffie-Hellman with unique assembling and decrypting the random pool while calculating each transformation of the pool then extracting Initialization Vectors and Keys from the pool thus encrypting/decrypting the file chunks at each endpoint independently

There is no safer way to secure unstructured data than with ETESS,” said Federico Simonetti, founder and CTO, Extenua, “We started with a clean slate approach to solve this enormous problem of big data’s need for a new approach to encryption and key management. What we designed is the most secure method to utilize encryption known today and is the easiest key management system to deploy and manage because it is fully automated and dynamic.

Enterprises large and small face security challenges in taking advantage of the productivity and economics f cloud storage. Extenua Cloud2Drive and SaferNAS with ETESS makes shared cloud storage secure, easy-to-access and simple to deploy with either new or existing cloud storage deployments and providers,” said Steve Visconti, CEO, Extenua, “Applying superior encryption methods with a fully automated dynamic encryption key management platform is truly a game changing technology which is very much needed in today’s hostile environment. The enterprise require superior protection with less complexity in order to avoid the many well publicized attacks recently reported by Equifax, Yahoo, Uber and many more.

Interview with Steve Visconti

Articles_bottom
AIC
ATTO
OPEN-E