Loading...
Loading

Covata Takes On Internet Of Things Security With Encryption Key-as-a-Service Offering

04:25:35 - 05 February 2016

New Geo Location and Key Fragmentation Features Boost Data Protection by Making It Harder to Snoop

WASHINGTON, DC--(Marketwired) -Covata, a global leader in data­-centric security solutions, announced today that its new 'Key-as-a-Service' (KaaS) offering will initially be deployed with Tech giant Cisco. The service will eliminate the burden of encryption key and access policy management, as well as guarding against upcoming legal and regulatory issues, through patent pending techniques such as key fragmentation and GeoLoc. With the amount of data due to increase exponentially as the Internet of Things (IoT) takes off, securing the keys and achieving data sovereignty will be absolutely vital to avoid hackers using these devices as a vehicle to compromise corporate and personal networks. Cisco and Covata are already looking into a range of IoT and cloud projects that will determine the first Covata KaaS customer to embed the service into their products.

Covata KaaS provides a scalable and tailored framework for protecting content wherever it resides, supporting policy driven access and allowing for full access remediation. Its patent pending Geo Location process shifts the focus from trying to control where data is, to controlling the location of the encryption keys. KaaS eliminates the complex, hitherto unresolved issue of protecting billions of pieces of unstructured data flowing around the Internet. KaaS provides an open standard to allow this protection to happen in the background with very little overhead. If access is requested within the data sovereignty jurisdiction, then the policy permits the release of the key. The data also never passes through the key server, as it is encrypted on the device and only the authorised intended recipient can decrypt it. This also ensures a full audit trail for compliance.

In practice, a company may use the geo-policy to block any keys being issued to data that is not physically within a specific countries borders. For example if an employee is travelling to a foreign country and their phone or data becomes compromised on local networks, the hacker will not have access to data as the key will not be issued while the device is in in that country -- Covata GeoLoc.

Covata KaaS also offers key fragmentation. The master key is fragmented and then delivered to four different data custodians; within Covata KaaS, the government or duly authorized agent of the government from where the generating key service resides, tenancy owner or its nominated escrow agent, and the auditing firm of the Covata KaaS. This ensures that only the federal or authorized parties can access a whole key by obtaining a duly presented court or similar order from the legal jurisdiction of the home key service. In effect, this reassembly process ensures that any government can only gain access to data through a rigorous and open process -- not via snooping.

"The Covata KaaS standard security protocol is the only way to maintain the integrity of the open Internet," said Trent Telford, CEO of Covata. "The Internet was designed to share information, it wasn't designed to be secure, which is why continually bolstering perimeter defences is like trying to beat a wild horse into submission. We're offering a modern approach to security that enables everyone who enjoys the creativity, openness of the Internet to continue to do business securely with the same ease and flexibility they expect. Data sovereignty is achieved through key sovereignty -- a genuine security revolution and one we think will solve this major 21stcentury hurdle."

"The Internet of Things is going to blow the number of machines connected to the Internet out of the water, and hugely increase the number of transactions we see occur online. A vast amount of this unprotected data is continually being sent to cloud or big data services where it is aggregated and used for decision-making. With much of this data being either moderately or extremely sensitive, it is creating a potential goldmine for hackers. The ramifications of this data being compromised could range from terrorist attacks shutting down vital operations such as power or transportation systems, through to stealing market sensitive data, which is why IoT needs a new approach to security. Cisco is not just talking the talk in moving to cloud and IoT, but walking the walk like no others," concluded Telford.

About Covata

Covata enables true ownership and control over your data in the cloud and over mobile services. We deliver data-centric security solutions without compromising simple usability, providing true end-to-end security. Your data is always protected wherever it may travel -- inside your network, beyond the domain, to mobile devices and to the cloud -- with granular access controls that extend to external users, view-only restrictions, real-time revocation and complete visibility and auditability. Own Your Data, control your data and choose where it is stored -- with complete assurance that it is protected and secure. For further information, please visit Covata.com.

Contact Information

Media contacts
Nikki Parker
Covata
Vice President Corporate Communications
+1 571 353 4273
nichola.parker@covata.com

Lindsey Challis / Claire Ayles
Covata Team at Finn Partners, now incorporating Johnson King
covatateam@finnpartners.com
0207 017 8427

news_buffer

Leave a Comment