Vogt says, “The focus of cyber criminals is shifting from data theft to data manipulation.”Encryption alone might not be sufficient to prevent data tampering associated with high-profile data breaches and malicious hacks. In order to protect against data tampering and to maintain data integrity, Zettaset utilizes Authenticated Encryption using Associated Data (AEAD) methodology to protect the encrypted data against unauthorized modification.
The company renders security through two big data encryption products—BDEncrypt and BDEncrypt Plus. While BDEncrypt acts as a partition-level solution to enable bulk encryption of stored data, BDEncrypt Plus offers granular encryption at the file level to ensure additional layers of data protection.
BDEncrypt Plus is the only encryption solution that cryptographically protects Access Control Lists (ACLs) to safeguard data from unauthorized tampering, from within or outside the organization
Zettaset has established strategic partnerships with leading encryption key management and hardware security module (HSM) vendors, including HPE Security, Gemalto (SafeNet), Thales e-Security, and Utimaco. Zettaset’s encryption solutions are based on industry standards for interoperability, greatly simplifying integration with existing IT security infrastructure and policy frameworks. Zettaset’s BDEncrypt and BDEncrypt Plus solutions adhere to the Key Management Interoperability Protocol (KMIP) as well as PKCS #11, one of the Public-Key Cryptography Standards guided by the Organization for the Advancement of Structured Information Standards (OASIS). These standards ensure that Zettaset encryption solutions are fully-compatible with an organization’s existing key management and HSM infrastructures.
Zettaset to date has filed 10 patents, out of which five have been granted, each one associated with security, encryption processes, and performance in distributed computing environments. “Our company expertise on cryptographic procedures, encryption methodology, and data integrity protection enables us to maintain an increasing advantage over our competitors,” says Vogt.
In addition to helping enterprises that need to secure massive amounts of personally-identifiable information, the company is focusing on federal government agencies that are vital to the nation’s security, and who are vulnerable to malicious attacks and data manipulation. “We are moving aggressively in this new direction,” reaffirms Vogt.