Data Sheet

SECURING SENSITIVE CUSTOMER
DATA IN THE CLOUD
Enterprise-class data encryption for securing critical customer
information anytime, anywhere.
Data Security in the
Insurance Industry
The insurance industry is a rich
target for cybercriminals due to the
fact that data stored and transferred
among insurance-related companies
contains personal, financial, and
health information. Stolen information
fetches almost $500 per record on
the black market, compared to a
dollar or less for a credit card number1.
Cyphre’s Enterprise Data Protection
Suite with advanced BlackTIE®
encryption technology offers insurance
companies the necessary security to
nullify cyberattacks and strengthen
trusted relationship with customers.
The insurance industry relies upon
Big Data and Cloud Computing as a
means of improving product offerings
and growing its customer base. With
large amounts of private information
crossing internal and external
networks, insurance companies must
adopt a more effective and expansive
data protection posture. Cyphre
provides the necessary data protection
solution to secure insurance information
with the use of BlackTIE® encryption,
which protects previously vulnerable
encryption keys, rendering any hijacked
keys useless to hackers.
In 2015, Anthem was a victim of a data
breach and 80 million highly-sensitive
patient health records were exposed.
If the data had been encrypted with
BlackTIE® technology, the use of
protected encryption keys would have
rendered any information unusable and
protected the privacy of the affected
individuals and the reputation of the
company. By implementing a data
protection solution, such as the Cyphre
Enterprise Data Protection Suite with
BlackTIE®, insurance companies can
protect valuable company and client
data from the inevitable event of a
breach.
Benefits of Cyphre Enterprise Data Protection Suite:
1
Marketable benefit to build market
share and bolster reputation
Compliance with federal, state,
and industry regulations
Heightened privacy strengthens
customer trust
Mitigation of cost and liability
concerns
Extension of security policies
broadens data protection radius
Flexible deployment models:
public/private cloud, on-premise
BlackTIE® Features
Unassailable Protection
Cyphre’s BlackTIE® augments
vulnerable single encryption keys
with hardware-encrypted Black Keys
to render hijacked keys useless,
thus nullifying potential threats.
Productivity & Collaboration
BlackTIE® operates transparently
and is invisible to the end user for
a seamless user experience.
Its heightened security does not
hinder the ability of businesses and
their employees to be productive,
nor does it limit collaboration.
Key-Per-File Protection
Rather than using a single encryption
key to protect files, BlackTIE® uses a
unique key for each individual file as
an extra layer of security.
Key Management
Many enterprises wish for their IT
departments to manage their keys;
BlackTIE® allows the option for total
control of encryption keys.
http://www.npr.org/sections/alltechconsidered/2015/02/13/385901377/the-black-market-for-stolen-health-care-data
BlackTIE® Encryption Architecture
Cyphre Key
Management
System
Collaboration/Sharing Application:
Identity Access
Management
AD/LDAP
Cyphre Encryption Gateway, Webserver/TLS, Redis Data Cache
OpenSSL with CryptoDev extension
Cyphre Security Engine
BlackTIE® Key
Protection,
Encryption, &
Management
CryptoDev API
SEC4.0 Driver: AES, ECDH, Black Keys, TRNG
Hardened Linux OS
BT-1 Appliance:
SEC 4.0 Security Engine
- OTPMK and KEKs
- AES & ECDH offload engines
- SecureBoot HW Boot Image authentication
- True Random Number Generator
Data in Transit [Protected]
Data at Rest [Protected]
Amazon, Box, ...
BlackTIE® Technology
Cyphre’s BlackTIE® encryption technology protects the privacy of clients’ information through
the use of Black Keys. These hardware-encrypted keys add an extra layer of security on top
of standard TLS encryption. This approach guarantees that only those systems with verifiable
keys can view files. Unlike software-only encryption, Black Keys are never readable in
plaintext, nor are they exposed in memory. Even if a threat event occurs and an attacker
is able to access the main memory buffers, Cyphre’s Black Keys are still protected and
rendered completely unusable. Further, Cyphre does not require a threat to be
detected in order to instantiate protection. The nature of Cyphre’s blackened
keys ensures that they are unusable and indecipherable at all times.
About Cyphre
Headquartered in Austin, Texas, Cyphre cloud encryption technology
provides the highest level of security for cloud data. Period.
Product offerings include Encrypted Cloud Storage and Enterprise
Collaboration services, Secure IoT Integration and the Enterprise
Cloud Encryption Gateway.
www.cyphre.com
Copyright © 2016 Cyphre
@getcyphre
Cyphre
/getcyphre
More information at www.cyphre.com
REV 11/16