Got questions? We have answers.

  • CyRNA
  • IT Infrastructure
  • Competition

Why is fragmentation better than encryption?

As fragmentation happens on top of encryption, it makes the encryption more secure by a factor of at least 44 orders of magnitude. To put that in perspective, if you had the computing power to try to rearrange the chunks at a rate of 1 trillion per second, CyRNA has been tested that it would take 20 years to try each possibility. In addition, Quote by Lockheed Martin’s Senior Fellow and Scientist Robert Hale - “The probability of an attacker identifying and acquiring all of the shards of a particular data file, correctly reassembling them in the correct order, decrypting the data file and exploiting its information in a timely fashion is remote at best.”

 

Types of data/files stored?

All data types can be stored.

 

Hosted solution or technology licensed to corporations?

Subscription Hardwar and Software/ Licensed based model.

 

Targeted companies?

Banking / Medical / Government and Defense.

 

Software as a service?

Hardware/Software is licensed on a yearly contract.

 

Pricing model?

Year based Hardware/Software license.

 

Liability?

Restore information to its original state.

 

Scalability?

Software/Hardware is presently cloud based and can be scaled in any form. For the data: more drives or cloud storage can be added up to the limit of current storage technology. For the back end: no particular limit on the number of users and files, performance-wise the maximum number of concurrent users or connection depends on the bandwitdh and computing power of the server. V1 hasn't been designed for/tested in a scalable cluster scenario.

 

Upgrade path?

VM ware for more flexibility with middleware and front end implementations, scalability, better redundancy and performance. Also, on a 3-year license hardware is replaced for new gear. Software is updated regularly for free.

 

Any industry standards for fragmentation?

Not currently this form of Data Protection is too new.

 

Difference from RAID?

RAID isn't designed to protect the data from theft and RAID does not randomly fragment data that passes through it.

 

Tiers or levels of fragmentation?

Ability to split information above the 38 default settings. Fragmentation levels can set to whatever level the customer wants

Hardware failure loses key, recovery?

Redundancy happens within the hardware unit for full recovery of the information, hardware is recommended to be sold in pairs as well. Depending on the client's requirement, backup can be fully stored at a place like Iron Mountain or it can be local with a redundant unit.

 

What hardware or software is virtual?

Not at this time.

 

Redundancy of hardware?

Hardware redundancy to be sold in pairs and can be made redundant as many times as the client needs. (Each Hardware Unit has a unique I.D., which only CyRNA can Clone.) (See PDF)

 

SLA's for hardware?

Event of Hardware failure, a service agent is dispatched with a replacement unit as soon as possible within 48hrs.

 

SLA for network?

For network-based service, a service agent is dispatched to resolve the issue within 24hrs.

 

Redundancy of data?

Client decides what method of redundancy can be applied. We can accommodate any method.

 

Backup schemes?

Client decides what method of backups can be implemented.

 

Disaster recovery?

Our units have redundancy, but not responsible for, natural disasters, facility arson, intentional physical damage, physical missuses and electromagnet damage. We always strongly suggest using a solid disaster recovery such as Iron Mountain.

 

Force Majeure scenarios?

Our units have redundancy, but not responsible for, natural disasters. We always strongly suggest using a solid disaster recovery such as Iron Mountain.

 

Is encryption used?

Yes, 256 to flat the data before processing. However, the keys are only used to flatten the files. They are not used to protect the data.

 

How many bits encryption?

Any number of bits can be used. Encryption is only used to make the data uniform. Currently, 256 bits are used.

 

US export requirements?

North Korea, Russia and China not available.

 

Latency between storage servers?

Minor and this would be on a case-by-case basis.

 

Ethernet speed between servers or different sites?

Ethernet speed is determined by the hardware used. The better the hardware, the faster the speed.

 

Gateway throughput requirements?

Depending on the gateway requirements, the software can be tuned to accommodate.

 

Virus detection / cleansing?

Not responsible for this feature. However if the Virus were to pass thru the CyRNA System, it would be encrypted and chopped up into random unreadable pieces and probably not affect the network. The software is not designed to detect or clean computer viruses.

 

Vulnerable to ddos attacks?

Distributed Denial of Service attacks are difficult to defend against. Depending on the scale of the attack, the amount of data inundating any network can overwhelm the network. Our software isn't designed to resist such an attack. Although, we do use a RADWARE DDOS product called The Defender. It has been tested to mitigate about 97% of most DDOS Attacks.

 

Vulnerability to ransomware?

Ransomware in a network or computer is the result of an individual being fooled into accessing and installing it. There's no defense against a user who is carless.

 

Vulnerable to Trojan?

The software isn't designed to defend against Trojan Horse software installed like Ransomware. However if the Torjan were to pass thru the CyRNA System, it would be encrypted and chopped up into random unreadable pieces and probably not affect the network. Again, there's no defense against a user who is carless.

 

Vulnerable to social engineering?

All humans are vulnerable to social engineering. Therefore, valid credentials of humans can be obtained. If the human has valid access to the software, then the software can be compromised.

 

Vulnerability to skimming?

Skimming is done with Credit Cards or by organized crime associates in Casinos. The software cannot stop skimming.

 

Any MIL standards for testing vulnerability?

The software wasn't designed for military use so no MIL standard was used to test the software. However, We have been tested for a year by a Major Defense Firm. (See PDF)

Why can't Oracle, Microsoft or Symantec (or any large company ) duplicate?

So far we have had an open network for over 28 Months. We have invited all Major Firms to reassemble and bring us the data. Those who tried, have so far failed. In addition, we have had this network at DEFCON 21 and 22 and both times not one Hacker was able to reassemble the data. Why can’t they do this? We cannot answer that question. We invite you to take all of the raw data off of the network and try to reassemble it or get any expert you may know to do the same. There are no firewall or any protection. The network is open. Cyrnacloud.com This is ONLY a test site and has NO SSL Certificate.

 

What do patents protect?

Our process of randomization.

 

What other technology / patents is this built on and how licensed?

No other 3rd party Licenses are involved this is completely Proprietary, except for the encryption keys (we use RSA 256 bit keys) Note: All work our team does is Proprietary.

 

How will company defend patents?

We have very good Patent litigation team at McDermott, Will and Emery.

 

Defense against patent Trolls?

The Patent does not give away how the data is reassembled. So even if someone were to read the patent, they would not know the formula for putting the data back together.

 

Will net neutrality affect business?

Not to our Knowledge.

© 2016 Oceansblue Systems LLC. All rights reserved.