DefiniSec | Advanced Endpoint Data Protection
  • Home
  • Technology
    • KODiAC
    • MultiPhase Value
    • Shortcomings
  • SSProtect
    • :Foundation Client
    • Protect >
      • :Access
      • :Confidential
      • :Email
    • Manage >
      • :Assess
      • :Collaborate
      • :Expand
      • :Recover
    • Respond >
      • :Honeypots
      • :Respond
      • :xRecovery
    • SSProtect
  • Support
    • 3-Minute Video Series
    • Applications
    • Pricing
    • Downloads
  • Company
    • About
    • Insights
    • Team
    • Careers
    • Contact

Technology Overview


Picture
There are literally hundreds if not thousands of security products to choose from, but very few offer effective protection from advanced attacks. These require concerted coordination of protective measures not found in a single product. In fact, a greater part of the challenges lies in finding the right combination of existing products compatible with your infrastructure and technologies.

SSProtect addresses these problems using known capabilities refined through experience and enhanced with strategic innovation. Though no single solution can address all threats types, SSProtect was designed to inhibit nation-state espionage, organized crime, and other so-called APTs that use Ransomware, custom malware, backdoor trojans, 0-day exploits, impersonation, and combinations of related attack vectors.

Refer to the introduction and links, below, to find more information.


Application Data Protection

SSProtect protects information contained in application data files to stop threat actors from using stolen credentials to offload sensitive data. This requires a multitude of mechanisms summarized here and highlighted in linked pages: 

  1. :Access fine-grained two-factor authentication along with plaintext data and key isolation for protected authorized content access
  2. :Assess secure and forensically-viable event auditing and data reporting, answering the all-important, "How bad is it?" almost instantly
  3. :Collaborate manages crypto keys and identities for secure, seamless data sharing with teammates and Trusted 3rd parties
  4. :Confidential manages in-place encryption and protected content identity which, with :Access, retains native handling
  5. :Email is a complete policy-based mail security solution built with an Outlook Add-In that uses SSProtect :Expand to secure data
  6. :Recover inline backup and restore with no added impact to users, exposing all versions of all protected data for instant restoration

Each component provides essential protection for one or more aspects of the required protective posture. Examples include:
  1. In-place Data Encryption with Isolated Key Management
  2. Integrated Two-factor Authentication
  3. Cryptographic Offloading
  4. Continuous Backup and Restore
  5. Seamless Collaboration
  6. Secure Data Reporting
  • Intruders on compromised machines can take files, not read them
  • Thieves can pretend to be Windows users, but not SSProtect users
  • Event data is secure and reliable, and always available to you
  • Avoid the painful impact of Ransomware and/or Sabotage
  • Protect file sync & sharing content, never sync plaintext to the cloud
  • Instantly classify data exposure risk across your Organization assets

​In Summary

Nearly 95% of all networks have suffered a data breach. In 2014 over 1 billion records were compromised in over 1500 data breaches - a 78% rise over 2013.* SSProtect provides more than data protection - it offers distinctive MultiPhase Value that lays the foundation for continuous process improvement required to stay abreast of developing threats. Download the free version today, and be sure to check out our Product Bundles for pricing.

* From 1 Billion Data Records Stolen in 2014, Says Gemalto, Wall Street Journal Cybercrime blog, Feb 12, 2015.
Copyright © 2018 Definitive Data Security, Inc. 
info@definisec.com
415-529-5225