> SCM Preventing Wiki Leaks and creating a secure network requires ONLY three things: 1. Secure network access 2. Secure data transmission 3. Secure data storage. All data is automatically uniquely encrypted.
Description: SCM How did Wiki Leaks happen? A disgruntled employee with an agenda goes to work with USB flash drives and copies restricted files off of the server, because there is NO adequate secure network. Preventing the Wiki Leaks scenario and creating a secure network requires ONLY three things:
1. Secure network access. All users logging onto the network are identified by a UNIQUE key that performs dynamic identity verification and authentication (DIVA). 2. Secure data transmission. All data transmission occurs in an encrypted state. Secure File Interchange 2 (SFI) establishes a dynamic distributed key infrastructure (DDKI) framework. 3. Secure data storage. All data is automatically uniquely encrypted with a key related to the user’s name and password, and saved in a “virtual container” SPECIFIC to that user in an encrypted state. Whitenoise ensures 100% network security in the SIMPLEST manner to install, learn and use. Data is ALWAYS protected with UNIQUE identity based encryption so it is ALWAYS secure in transmission and storage. At any point when there is an unauthorized attempt to access files or functions, the INHERENT INTRUSION DETECTION instantly recognizes that DIVA is not in synch and the network self-protects by the AUTOMATIC REVOCATION of network access to that key. Whitenoise’s solution is scalable, interoperable and works with ANY kind of network. The three applications needed to secure a network can be integrated into ONE management console. Setting up employees’ computers and determining which files/folders/applications they can see and access is EASILY done by the system administrator through the normal Windows operating system interface. Learning and performing COMPLETE system administration and COMPLETE secure network setup and distribution of keys takes approximately two hours. Secure single-sign on network access and login is SIMPLE and requires NO training of employees. The system administrator can always recover data.
Change Info: Grand Finalist IFSEC 2011 - Grand Finalist Global Security Challenge 2010 - Presented to the United Nations ITU - White House OSTP - International Patents and Export permits granted - Secure Cloud Computing - Prevent Wiki Leaks scenarios - Works with any existing network security applications.
DevSolutions Crypt 1.0.1 DevSolutionsCrypt library is a powerful and easy to use cryptographic ActiveX and DLL component for Windows developers that allows applications to encrypt/decrypt data or files
Whitenoise Security Suite 6.00 Whitenoise UNBROKEN - RSA Challenges Broken. . There was no winner of the $100,000 Whitenoise Security Challenge. Secures data and identity. Simply point and click to secure files