Audit-proof data protection for cloud infrastructures 

Audit-proof data protection for cloud infrastructures

Share post

The patented microshard process defies current data protection concerns in relation to cloud infrastructures: data is broken down into single-digit bytes without loss of performance. These microshards are then stored in cloud environments or on on-premises servers.

Generally applicable regulations such as the General Data Protection Regulation (GDPR) or industry-specific standards such as the KRITIS regulation of the BSI or the telematics infrastructure often impair corporate flexibility and agility. They go hand in hand with new investments. Corporate decision-makers are increasingly unsettled. In view of the unclear legal situation, many therefore hesitate to outsource parts of their infrastructure to a cloud infrastructure.

Data protection for cloud infrastructures

In addition, after the failure of the Privacy Shield, the exchange of data between the EU and the USA is still unclear in terms of data protection. This poses a real compliance dilemma for company management: the storage of personal data in the cloud is fundamentally problematic - especially if the cloud servers of your provider are not in GDPR-compliant countries.

"Especially in the DACH region, there are still many reservations about switching to a cloud infrastructure," Pascal Cronauer, Head of Sales in EMEA at ShardSecure, knows the concerns of the companies. “But now there is a new procedure that clears up all data protection concerns. A solution that has no impact on business agility and makes complex key management obsolete! We look forward to entering the market in the DACH region and are already looking forward to customer feedback and partner inquiries.”

Sharding method makes data unreadable

The principle is actually simple: How can sensitive data be converted into insensitive data for anyone who does not have authorized data access? ShardSecure solves the data protection dilemma with a new security procedure: Microshard™ technology enables legally compliant data exchange on all server infrastructures - without complex encryption systems. Many security practitioners are already familiar with the technique of sharding, which has long been used by storage and database companies like Oracle, Altibase, and MongoDB, and tools like ElasticSearch and MySQL to improve performance.

Files are divided into several parts and stored in different locations. As a rule, these parts are a few thousand to a few million bytes in size. Microshard™ technology also splits a file into multiple parts, but the parts are extremely small. Shards can be as tiny as a single byte. Since the microshard pieces are so small - often only 4 bytes - sensitive information does not fit in just one snippet of data. The puzzle can only be solved if all the pieces fit together again. For example, 4 bytes is too small to display a social security number, credit card number, or email address.

ShardSecure is the only solution capable of splitting data into single digit bytes without sacrificing performance. Microshards are stored in various locations, whether in cloud environments (such as Amazon, Microsft or Google) or on-site servers. Important: Shard locations are not linked or known. So an attacker who possibly intercepts microshard data has no way of putting the parts back together.

Benefits of Technology

The advantages of microsharding are manifold. The technology not only helps companies to effectively protect customer and employee data, it also offers significant added value from a regulatory perspective. Privacy and security professionals also appreciate the way microsharding drastically reduces the attack surface by shredding, mixing and distributing data - another key benefit of the approach.

Advantages compared to encryption technologies

While encryption offers sufficient protection in many cases, microsharding completely eliminates the issue of key management. For example, if the data decryption key is lost, the data is gone too. Future technologies such as quantum computing can hardly be handled with current encryption technologies, since terabytes and petabytes of data would have to go through the process of encryption and decryption again and again - this also affects the costs.

There are also benefits when it comes to DevOps. In the future, application developers can concentrate fully on writing and reading their data. Your respective development status is securely stored according to "trust by design" using the Microshard™ process.

More at ShardSecure.com

 


About ShardSecure

ShardSecure is changing the nature of data security. By using ShardSecure, all companies should be able to use the advantages of cloud implementation easily and securely in the future without having to give up control of their data. As the inventor of patented microshard technology, ShardSecure cloud-enables sensitive data by shredding it, distributing it across multiple cloud servers, and reassembling it.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more