About Us

Privitar NOVLT Secures Sensitive Data Using A Format Preserving Encryption Algorithm

Privitar introduced the latest version of the Privitar Data Privacy Platform. NOVLT, a new tokenization method. NOVLT, which supports broader use cases and data sharing across borders, is designed to provide the benefits of tokenization while removing the dependency of a vault. Customers will have full flexibility to customize their approach to data protection for individual use cases, with Privitar offering two, complementary methods of tokenization.

“Safeguarding data is a challenge that requires different approaches depending on the context – the data, the use case, the user. We developed Privitar NOVLT to strengthen our existing offering and give customers the flexibility to choose exactly the right tokenization approach based on their architecture and performance requirements for each of their use cases. Customers can use a token vault, NOVLT, or a combination of the two, even within the same policy. Privitar eliminates the need to make a false choice,” said Steve Totman, Chief Product Officer at Privitar.

How Privitar NOVLT works

NOVLT uses a format-preserving encryption technique for consistent tokenization to secure sensitive data. It generates consistent and unique tokens with specific forms using certified secure cryptography. It also adds an extra degree of security by supporting Privitar’s unique privacy features, such as the ability to embed Privitar Watermarks in tokenized data and regulated linkability with Protected Data Domains.

Privitar NOVLT is a completely distributed system that ensures data security and interoperability across data sovereignty areas. This is especially advantageous for businesses with a global presence and for businesses that work on projects with foreign partners. Privitar NOVLT will allow them to comply with requirements such as GDPR by de-identifying data in a specific place before sharing it across borders, while yet maintaining a link to a protected dataset in the centre.

“Many of our customers are trying to share data for analysis across geographies, but are blocked by data sovereignty laws. This means data cannot move across boundaries without the appropriate de-identification techniques applied beforehand. Privitar NOVLT makes that possible without the headaches,” added Totman.

Castellan’s The New Crisis Management Module Allows Holistic Resilience Management

Castellan Solutions, a leading firm providing resilience management solutions, announced the launch of its new Crisis Management module, which enables companies to act quickly and effectively in the crucial times following the onset of a business disruption.

The risk landscape has evolved, and business as usual is being called into question on a daily basis. As supply chain disruptions continue and cyber attacks grow in magnitude and frequency, the question is no longer whether disruption will occur, but when.

Organizations can integrate better and optimise readiness activities (operational resilience, disaster recovery, business continuity, and compliance planning) and response activities (crisis/incident management and emergency notification) to reduce the impact of business disruptions affecting their people, consumers, reputation, and revenue by taking a holistic approach to risk management through resilience management.

Castellan’s SaaS platform provides a fully integrated solutions can help users to analyse and prioritise risk, develop actionable response and recovery plans, interact with colleagues through multiple channels, stress test plans using possible scenarios, and rapidly mobilise response teams in the critical moments of an incident occurring – all from a single platform.

The Crisis Management module fully integrates with Castellan’s multi-modal emergency notification capability, allowing organisations to communicate and manage an incident with confidence through:

Task Management: Activate plans and drive accountability with interactive task management and tracking, with an ability to assign ad hoc tasks based on the unique nature of the incident.

Encrypted Chat: Collaborate securely across teams with encrypted chat inside each incident, even if normal channels are compromised.

Mobile Functionality: Drive all response coordination, from incident creation to task management, straight from your mobile device.

Executive Dashboards: Provide real-time updates on the situation and the overall response.

“To confidently achieve the right level of resilience, organizations must work to close high priority vulnerabilities and build a world-class response capability “The innovation and expansion of our SaaS platform paired with our consulting and managed services enables our clients and partners to manage their response to multiple, simultaneous threats with ease,” said Jon Ezrine, CEO of Castellan Solutions.

Quantum Xchange Teams Up With Thales To Enable Quantum-Safe Key Delivery Across Any Distance, Over Any Network Media

Quantum Xchange, with its cutting-edge key distribution infrastructure, has teamed up with Thales to provide quantum-safe and crypto-agile key delivery options. End-users can use the quantum-resistant network solution to future-proof their data and communications network systems; conquer the vulnerabilities of current encryption techniques, such as keys and data travelling together, and defend against man-in-the-middle, harvesting, and future quantum attacks.

“Phio TX used in combination with Thales High Speed Encryptors (HSEs) arm customers with a powerful, enterprise security solution capable of making native encryption keys immediately quantum resistant. The standards-based solution can easily meet the risk mitigation needs of a business at any time and delivers an infinitely stronger cybersecurity posture to any network environment,” said Eddy Zervigon, CEO of Quantum Xchange.

“Quantum computing will be one of the biggest technological achievements in recent memory, but it comes with a lot of security risks. While there is no such thing as a silver bullet when it comes to cybersecurity, deploying crypto-agile systems, or those with the ability to update cryptographic algorithms, keys and certificates quickly in response to advances in cyber-attacks is the next frontier in protection against the emerging threats. Today Thales is enabling businesses to deploy security algorithms in a flexible way that include quantum-resistant algorithms that provide mitigation techniques to the current and future security risks presented by the evolution of quantum computing. NIST is currently selecting finalists amongst the quantum-safe encryption algorithms being developed. In anticipation of this, Thales already supports the current finalists including Thales’ Falcon algorithm,” said Todd Moore, Vice President Encryption Products at Thales.

Sectigo Launches Secure Key Storage Solution for IoT Devices to Provide Strong Authentication and Secure Communications

Sectigo, a global provider of digital certificates and automated certificate lifecycle management solutions launched Sectigo Secure Key Storage SDK (SKS-SDK) to its portfolio of industry-leading products.

Secure key storage is a software-based library that maintains, seals, and saves encryption keys, passwords, and other private information in an efficient and cost-effective manner. It eliminates the possibility of credentials being exposed on devices that don’t have a hardware-based secure key store mechanism like a Trusted Platform Module (TPM).

IoT device makers across the industry are swiftly understanding the need to increase security in their products to protect customers from attacks that target embedded devices and expose them to data theft, service disruption, and the spread of the cyberattack to other systems. Legislation and industry standards are requiring stricter authentication in several sectors.

Although most advanced IoT devices provide a hardware platform for secure key storage, many low-cost or outdated devices lack these features. In addition, providing secure key storage to IoT devices raises the bill of materials, making hardware solutions less economical. Sectigo’s latest product bridges the gap in the IoT security field by providing an accessible alternative for lower-cost IoT devices that don’t include secure key storage hardware.

“Enhanced levels of security should be available for all IoT devices to help prevent noncompliance with ever-changing legislation and standards, device cloning, and the introduction of counterfeit devices into the market. Sectigo’s latest secure key storage solution enables IoT device manufacturers to protect private keys and critical information from hackers with special attention to affordability and compliance,” said Alan Grau, VP of IoT/Embedded Solutions at Sectigo.

Virtual Private Networks – Insights

VPNs encrypt internet traffic and hide a user’s identity online. It establishes a protected network connection while using public networks. The encryption of data is done in real-time. VPNs mask internet protocol (IP) address. Third parties will have a harder time tracking and stealing data of VPN. Applications operating through a VPN get benefits of the private network’s functionality, security and control.

Business VPN

A business VPN is a service that requires customized setup and technical support. The VPN is configured by the company’s IT department. A user has no administrative control over the VPN and organizations log employees’ activities and data transfers. As a result, the organization can reduce the probability of data breaches. The fundamental benefit of a business VPN is that it provides a completely secure connection to the organization’s intranet and server, even for staff who work remotely and use their internet connection.

Increase Security with VPN

Private tunneling or remote network access may not be required by the company. However, an organization is likely to share some elements with larger companies. To begin, businesses most likely have cloud-based resources such as apps or data. A VPN gives businesses safe access without the hassle of maintaining and paying for pricey routing hardware. A virtual private network (VPN) establishes a secure connection between user’s systems and the resources to which they connect. Adding a VPN connection adds another degree of protection and security.

Scalability of the VPN

A private network can help a company get started, the cost of expanding it can be prohibitive. Businesses can provide resource access to multiple employees at the same time as per their need with minimum configuration and can extend VPN as their business grows in terms of number of employees or data storage space. They can also operate critical programs on the cloud and grant them access via the VPN’s secure tunnel.

Hide Sensitive Information with Encryption

Hackers can intercept sensitive information you enter on websites using a variety of methods. They can use that information to imitate and obtain access to bank accounts, financial transactions information and other personal information. High-level security, such as 256-bit AES encryption, is available with a VPN. Anyone who is able to eavesdrop firm’s internet traffic will see incomprehensible, jumbled text and characters.

Access in Restricted Internet Access Countries

Some businesses have staff who go to countries where internet access is restricted. In that situation, employees may be denied access to the organization’s resources that are available on the open web. Employees can access the Internet as if they were in their own country with the help of a VPN. 

Low Setup and Maintenance Costs

Small businesses have certain restrictions on the amount of money to spend on IT infrastructure. The information technology and its security is a crucial aspect for any organization, they must either spend money on it or risk losing their overall profitability. VPNs do not require any physical infrastructure or additional tools to operate. To put it another way, all an organization needs is a VPN subscription to use the service. Even if a business manages to run its own VPN server, the setup and maintenance are simple. Most VPN services don’t even charge to set up the VPN server because they handle everything for clients. Companies simply have to pay for the VPN subscription and then they are good to go.