T-Mobile is one of first advertisers to run a 1-minute video ad.
ZenithVault Database is the First Solution to Practically Eliminate the Possibility of Hacker Infiltration for Ecommerce, Corporation and Government Applications.
July 2, 2013 - ZenithSecure™ has launched the world’s most secure database solution which makes it practically impossible for hackers to gain access to storage systems and disable or steal confidential information. The ZenithVault™ database leverages automated secret sharing techniques to deliver the most secure database available today. It protects from cyber-attacks sensitive data such as credit card numbers. It is also ideal to protect personal data, financial documents, government secrets, patents, patient records and more.
The ZenithVault database accomplishes its advanced security primarily with automated data-splitting. First it encrypts data with the user’s defined password as the encryption key. After this process, automated data-splitting occurs and the split data is then distributed across multiple servers and geographies using SSL or Diffie-Hellman/Elliptic curve transport encryption. The transport encryption type is based on the ZenithVault version in use. Each storage server is running a different operating system (OS). The use of different OSes per server defends against zero day attacks and/or OS exploits. This exclusive secret-sharing technique creates the most secure database available today. No longer does a single server breach mean compromised data. ZenithVault represents the most secured database against external or internal hacking attempts.
Today, data is typically secured by applying a set of security layers over a centralized SQL database system. Hackers have mastered gaining access to these one dimensional systems. Security layers can usually be circumvented, no matter how many are used.
ZenithVault Key Capabilities
Data-splitting is performed at the bit level, which is more secure than splitting whole words or phrases. For example, instead of a whole word or credit card number being stored on one server, random bits of them are distributed among multiple servers. This is the key reason why breaching a single server is no longer a security threat. With ZenithVault, hacker intrusion to one server means only access to random meaningless and garbled bits of partially encrypted data. Attackers would have to simultaneously breach at least three geographically distant servers with each running different OSes and application environments. This is just to be able to view the entire encrypted secret, let alone try to piece it back together again. The more servers deployed, the greater the degree of security.
Another security feature is that the ZenithVault servers only send out data bits associated with the appropriate user password. These passwords are also subject to data splitting and encryption. ZenithVault is limitless in scalability. The more servers you add to the cluster, the higher the security and storage capacity it achieves, without affecting performance.
“We were inspired by the method employed by the United States government in securing its nuclear missile launch codes,” said Mihai Motocu, CTO of ZenithSecure. “It’s a technique known as ‘secret sharing’ where multiple secrets have to be combined together at the same time to gain access. This method has been known for decades and is mathematically proven to be highly secure. It’s at the heart of ZenithVault and is an excellent defense against brute force, zero day and other malicious hacker attacks.”
Three ZenithVault Products
Currently there are three versions of ZenithVault being offered: ZenithVault Freeware, ZenithVault Enterprise and ZenithVault SaaS (Software as a Service). ZenithVault is implemented within an existing application, in parallel with its database. The integration is easily accomplished using any programming language and can be deployed within a single day. It has no impact on any customer or user experience and it has no visibility at the application level.
ZenithVault Freeware offers data encryption using a customer’s password and full brute force attack protection by locking itself down when attacked. It uses at least three servers and can store information as binary data up to 10MB per entry. It is trusted platform module compatible and features SSL data encryption. It is compatible with Java, Python™, PHP, Ruby™, C# and other programming languages.
“We want to contribute to a safer electronic world by helping protect consumer, company and government data,” Motocu added. “This includes small and medium sized businesses. This is why we’re offering the Freeware version. It ensures all organizations can immediately deploy better data security than they currently have.”
ZenithVault Enterprise and ZenithVault SaaS are for organizations requiring advanced, customized security measures without sacrificing functionality. This includes ecommerce, small and large enterprises, and governments. Enhanced features include complete data redundancy, high availability and custom data flow or API integration. To ensure redundancy and high data availability, geographical storage instance scattering requires at least five servers. Enterprise and SaaS also feature advanced elliptic curve/Diffie-Hellman encryption in order to avoid Man-in-the-Middle (MITM) attacks. They also have the ability to handle an unlimited size of large data objects. Enterprise and SaaS offer an improved data flow model. Billing data is forwarded from the storage nodes straight to the payment gateways or other custom APIs. From the unsafe application the data is transferred to the storage node and then is sent out for processing. This one-way data flow reduces the risk of breaches to almost zero. Finally, Enterprise and SaaS versions can be managed from custom-built, read-only operating systems.
Pricing and Availability
All three ZenithVault versions are now available. ZenithVault Freeware is free and can be immediately downloaded here. ZenithVault Enterprise and ZenithVault SaaS pricing models are structured according to specific client requirements and their configuration needs. Learn more by clicking here. ZenithVault Enterprise and ZenithVault SaaS provide the same features. The difference is the SaaS version is a managed solution that ZenithSecure provides for customers.
ZenithSecure™ focuses on full-service security software and data security services. ZenithVault™ is the company’s flagship product. It is the industry’s strongest database security solution available today. By using secret sharing techniques ZenithVault’s unrivaled data protection is essential for secure credit card storage and storage of other sensitive information. In addition to advanced database firewall solutions, ZenithSecure has other industry-leading security applications under development. The company’s security services include software development, security integration and consulting as well as technical support services. ZenithSecure is a subsidiary of privately-held Agilio™ Software and has offices in Transylvania, Romania and London, England. More information about ZenithSecure is available at http://www.zenithsecure.com.