Technology Overview

There are literally hundreds if not thousands of security products to choose from, but very few offer effective protection from advanced attacks. These require concerted coordination of protective measures not found in a single product. In fact, a greater part of the challenges lies in finding the right combination of existing products compatible with your infrastructure and technologies.
SSProtect addresses these problems using known capabilities refined through experience and enhanced with strategic innovation. Though no single solution can address all threats types, SSProtect was designed to inhibit nation-state espionage, organized crime, and other so-called APTs that use Ransomware, custom malware, backdoor trojans, 0-day exploits, impersonation, and combinations of related attack vectors.
Refer to the introduction and links, below, to find more information.
SSProtect addresses these problems using known capabilities refined through experience and enhanced with strategic innovation. Though no single solution can address all threats types, SSProtect was designed to inhibit nation-state espionage, organized crime, and other so-called APTs that use Ransomware, custom malware, backdoor trojans, 0-day exploits, impersonation, and combinations of related attack vectors.
Refer to the introduction and links, below, to find more information.
Application Data Protection
SSProtect protects information contained in application data files to stop threat actors from using stolen credentials to offload sensitive data. This requires a multitude of mechanisms summarized here and highlighted in linked pages:
Each component provides essential protection for one or more aspects of the required protective posture. Examples include:
- :Access fine-grained two-factor authentication along with plaintext data and key isolation for protected authorized content access
- :Assess secure and forensically-viable event auditing and data reporting, answering the all-important, "How bad is it?" almost instantly
- :Collaborate manages crypto keys and identities for secure, seamless data sharing with teammates and Trusted 3rd parties
- :Confidential manages in-place encryption and protected content identity which, with :Access, retains native handling
- :Email is a complete policy-based mail security solution built with an Outlook Add-In that uses SSProtect :Expand to secure data
- :Recover inline backup and restore with no added impact to users, exposing all versions of all protected data for instant restoration
Each component provides essential protection for one or more aspects of the required protective posture. Examples include:
|
|
In Summary
Nearly 95% of all networks have suffered a data breach. In 2014 over 1 billion records were compromised in over 1500 data breaches - a 78% rise over 2013.* SSProtect provides more than data protection - it offers distinctive MultiPhase Value that lays the foundation for continuous process improvement required to stay abreast of developing threats. Download the free version today, and be sure to check out our Product Bundles for pricing.
* From 1 Billion Data Records Stolen in 2014, Says Gemalto, Wall Street Journal Cybercrime blog, Feb 12, 2015.