SECURING SENSITIVE CUSTOMER DATA IN THE CLOUD Enterprise-class data encryption for securing critical customer information anytime, anywhere. Data Security in the Insurance Industry The insurance industry is a rich target for cybercriminals due to the fact that data stored and transferred among insurance-related companies contains personal, financial, and health information. Stolen information fetches almost $500 per record on the black market, compared to a dollar or less for a credit card number1. Cyphre’s Enterprise Data Protection Suite with advanced BlackTIE® encryption technology offers insurance companies the necessary security to nullify cyberattacks and strengthen trusted relationship with customers. The insurance industry relies upon Big Data and Cloud Computing as a means of improving product offerings and growing its customer base. With large amounts of private information crossing internal and external networks, insurance companies must adopt a more effective and expansive data protection posture. Cyphre provides the necessary data protection solution to secure insurance information with the use of BlackTIE® encryption, which protects previously vulnerable encryption keys, rendering any hijacked keys useless to hackers. In 2015, Anthem was a victim of a data breach and 80 million highly-sensitive patient health records were exposed. If the data had been encrypted with BlackTIE® technology, the use of protected encryption keys would have rendered any information unusable and protected the privacy of the affected individuals and the reputation of the company. By implementing a data protection solution, such as the Cyphre Enterprise Data Protection Suite with BlackTIE®, insurance companies can protect valuable company and client data from the inevitable event of a breach. Benefits of Cyphre Enterprise Data Protection Suite: 1 Marketable benefit to build market share and bolster reputation Compliance with federal, state, and industry regulations Heightened privacy strengthens customer trust Mitigation of cost and liability concerns Extension of security policies broadens data protection radius Flexible deployment models: public/private cloud, on-premise BlackTIE® Features Unassailable Protection Cyphre’s BlackTIE® augments vulnerable single encryption keys with hardware-encrypted Black Keys to render hijacked keys useless, thus nullifying potential threats. Productivity & Collaboration BlackTIE® operates transparently and is invisible to the end user for a seamless user experience. Its heightened security does not hinder the ability of businesses and their employees to be productive, nor does it limit collaboration. Key-Per-File Protection Rather than using a single encryption key to protect files, BlackTIE® uses a unique key for each individual file as an extra layer of security. Key Management Many enterprises wish for their IT departments to manage their keys; BlackTIE® allows the option for total control of encryption keys. http://www.npr.org/sections/alltechconsidered/2015/02/13/385901377/the-black-market-for-stolen-health-care-data BlackTIE® Encryption Architecture Cyphre Key Management System Collaboration/Sharing Application: Identity Access Management AD/LDAP Cyphre Encryption Gateway, Webserver/TLS, Redis Data Cache OpenSSL with CryptoDev extension Cyphre Security Engine BlackTIE® Key Protection, Encryption, & Management CryptoDev API SEC4.0 Driver: AES, ECDH, Black Keys, TRNG Hardened Linux OS BT-1 Appliance: SEC 4.0 Security Engine - OTPMK and KEKs - AES & ECDH offload engines - SecureBoot HW Boot Image authentication - True Random Number Generator Data in Transit [Protected] Data at Rest [Protected] Amazon, Box, ... BlackTIE® Technology Cyphre’s BlackTIE® encryption technology protects the privacy of clients’ information through the use of Black Keys. These hardware-encrypted keys add an extra layer of security on top of standard TLS encryption. This approach guarantees that only those systems with verifiable keys can view files. Unlike software-only encryption, Black Keys are never readable in plaintext, nor are they exposed in memory. Even if a threat event occurs and an attacker is able to access the main memory buffers, Cyphre’s Black Keys are still protected and rendered completely unusable. Further, Cyphre does not require a threat to be detected in order to instantiate protection. The nature of Cyphre’s blackened keys ensures that they are unusable and indecipherable at all times. About Cyphre Headquartered in Austin, Texas, Cyphre cloud encryption technology provides the highest level of security for cloud data. Period. Product offerings include Encrypted Cloud Storage and Enterprise Collaboration services, Secure IoT Integration and the Enterprise Cloud Encryption Gateway. www.cyphre.com Copyright © 2016 Cyphre @getcyphre Cyphre /getcyphre More information at www.cyphre.com REV 11/16
© Copyright 2025 Paperzz