As fragmentation happens on top of encryption, it makes the encryption more secure by a factor of at least 44 orders of magnitude. To put that in perspective, if you had the computing power to try to rearrange the chunks at a rate of 1 trillion per second, CyRNA has been tested that it would take 20 years to try each possibility. In addition, Quote by Lockheed Martin’s Senior Fellow and Scientist Robert Hale - “The probability of an attacker identifying and acquiring all of the shards of a particular data file, correctly reassembling them in the correct order, decrypting the data file and exploiting its information in a timely fashion is remote at best.”
All data types can be stored.
Subscription Hardwar and Software/ Licensed based model.
Banking / Medical / Government and Defense.
Hardware/Software is licensed on a yearly contract.
Year based Hardware/Software license.
Restore information to its original state.
Software/Hardware is presently cloud based and can be scaled in any form. For the data: more drives or cloud storage can be added up to the limit of current storage technology. For the back end: no particular limit on the number of users and files, performance-wise the maximum number of concurrent users or connection depends on the bandwitdh and computing power of the server. V1 hasn't been designed for/tested in a scalable cluster scenario.
VM ware for more flexibility with middleware and front end implementations, scalability, better redundancy and performance. Also, on a 3-year license hardware is replaced for new gear. Software is updated regularly for free.
Not currently this form of Data Protection is too new.
RAID isn't designed to protect the data from theft and RAID does not randomly fragment data that passes through it.
Ability to split information above the 38 default settings. Fragmentation levels can set to whatever level the customer wants
Redundancy happens within the hardware unit for full recovery of the information, hardware is recommended to be sold in pairs as well. Depending on the client's requirement, backup can be fully stored at a place like Iron Mountain or it can be local with a redundant unit.
Not at this time.
Hardware redundancy to be sold in pairs and can be made redundant as many times as the client needs. (Each Hardware Unit has a unique I.D., which only CyRNA can Clone.) (See PDF)
Event of Hardware failure, a service agent is dispatched with a replacement unit as soon as possible within 48hrs.
For network-based service, a service agent is dispatched to resolve the issue within 24hrs.
Client decides what method of redundancy can be applied. We can accommodate any method.
Client decides what method of backups can be implemented.
Our units have redundancy, but not responsible for, natural disasters, facility arson, intentional physical damage, physical missuses and electromagnet damage. We always strongly suggest using a solid disaster recovery such as Iron Mountain.
Our units have redundancy, but not responsible for, natural disasters. We always strongly suggest using a solid disaster recovery such as Iron Mountain.
Yes, 256 to flat the data before processing. However, the keys are only used to flatten the files. They are not used to protect the data.
Any number of bits can be used. Encryption is only used to make the data uniform. Currently, 256 bits are used.
North Korea, Russia and China not available.
Minor and this would be on a case-by-case basis.
Ethernet speed is determined by the hardware used. The better the hardware, the faster the speed.
Depending on the gateway requirements, the software can be tuned to accommodate.
Not responsible for this feature. However if the Virus were to pass thru the CyRNA System, it would be encrypted and chopped up into random unreadable pieces and probably not affect the network. The software is not designed to detect or clean computer viruses.
Distributed Denial of Service attacks are difficult to defend against. Depending on the scale of the attack, the amount of data inundating any network can overwhelm the network. Our software isn't designed to resist such an attack. Although, we do use a RADWARE DDOS product called The Defender. It has been tested to mitigate about 97% of most DDOS Attacks.
Ransomware in a network or computer is the result of an individual being fooled into accessing and installing it. There's no defense against a user who is carless.
The software isn't designed to defend against Trojan Horse software installed like Ransomware. However if the Torjan were to pass thru the CyRNA System, it would be encrypted and chopped up into random unreadable pieces and probably not affect the network. Again, there's no defense against a user who is carless.
All humans are vulnerable to social engineering. Therefore, valid credentials of humans can be obtained. If the human has valid access to the software, then the software can be compromised.
Skimming is done with Credit Cards or by organized crime associates in Casinos. The software cannot stop skimming.
The software wasn't designed for military use so no MIL standard was used to test the software. However, We have been tested for a year by a Major Defense Firm. (See PDF)
So far we have had an open network for over 28 Months. We have invited all Major Firms to reassemble and bring us the data. Those who tried, have so far failed. In addition, we have had this network at DEFCON 21 and 22 and both times not one Hacker was able to reassemble the data. Why can’t they do this? We cannot answer that question. We invite you to take all of the raw data off of the network and try to reassemble it or get any expert you may know to do the same. There are no firewall or any protection. The network is open. Cyrnacloud.com This is ONLY a test site and has NO SSL Certificate.
Our process of randomization.
No other 3rd party Licenses are involved this is completely Proprietary, except for the encryption keys (we use RSA 256 bit keys) Note: All work our team does is Proprietary.
We have very good Patent litigation team at McDermott, Will and Emery.
The Patent does not give away how the data is reassembled. So even if someone were to read the patent, they would not know the formula for putting the data back together.
Not to our Knowledge.
© 2016 Oceansblue Systems LLC. All rights reserved.