Demo

Software that protects sensitive data before and during a breach.

The Problem White Paper The Solution Value Contact Us
Spacer

Even if a cyber-criminal is able to obtain a user id and password to gain access to your database, the sensitive data will remain protected.


Even if you give them the AES_256 Key, they still won't be able to decrypt the data, and encryption is only one part of the many layers of code that are employed to protect the data.


A brief explanation of what our software does.


Our Software has one job, and one job only. To Protect your data.

The following images show how our process works in a nutshell:

Steps in a nutshell packaging Steps in a nutshell unpacking

Our process is database independent, because all it does is package the sensitive or PII data for the calling third party application, which will then insert the data into the database. Our software doesn’t even know that there is a database out there or that it is prepping data for insertion or unpackaging data from a database retrieval. As far as the software is concerned, the application which is interacting with it could be requesting data to be packaged so that it could be inserted into an Excel spreadsheet or written to a text file.

Our software also doesn't care if you are passing one field to it to be processed or many fields. It doesn't need to know if you are passing it a routing number, a first name, or instructions on how to bake cookies.

Traditional database protection includes encryption of the entire database as a whole. Additional protection can be added through adding permissions and various rights to different users. These rights can be at the table level, or even down to the column level. Encryption can even be applied to the table or column(s) level. But once the encryption is broken, the data in the database, in the tables, in the individually protected columns is exposed. A column that has additional encryption protection and contains credit card numbers, once broken into, has those credit card numbers nicely displayed.

Additionally, this encryption involves key management which is either handled by the Database Administrator, or by the IT Security Team. The IT Security Team has to depend on the Database Administrator to handle the key management implementation since they are not authorized to touch the database. Our software handles its own key management independently of the key management of the database encryption. Even if a cybercriminal gets through all of the encryption that is associated specifically with the database, our encryption is independent of this. Our encryption will still be intact and if they get through that, there are multiple levels of translation and decoding/encoding that protects the data.

Our software protects the data beyond encryption, and our protection is independent of the defenses that are being used to protect the database. Our software has a very strong and powerful engine beneath the encryption process. This software solution can protect data down to the individual column/cell level. But unlike just protecting a column of credit card numbers, it protects a collection of sensitive or PII data beyond mere encryption. It makes the data unusable to a cybercriminal regardless of how they get in.

If you are interested in pursuing this offering, please contact Brian Mazar at (800) 248-0615 or mazar@fortunebta.com and request an NDA to receive a full package of information.

Please download our white paper for more information and to see how our software is different from other encryption software on the market.


It is time to start protecting the data and not just the database!

"Cybercrime is the greatest threat to every company
in the world, and one of the biggest problems with mankind.
The impact on society is reflected in the numbers."

"Last year, Cybersecurity Ventures predicted that cybercrime
will cost the world 6 trillion annually by 2021, up from $3 trillion in 2015.
This represents the greatest transfer of economic wealth in history, risks
the incentives for innovation and investment, and will be
more profitable than the global trade of all major illegal drugs combined."

Steve Morgan
Editor-in-Chief
CYBERCRIME MAGAZINE
The 18 biggest breaches of the 21st century

"The list is based not necessarily on the number
of records compromised, but on how much risk
or damage the breach caused for companies,
insurers and users or account holders."

  1. Yahoo: Date 2013-14. Impact: 3 billion user accounts.
  2. Marriott International: Date 2014-18. Impact: 500 million customers.
  3. Adult Friend Finder: Date October 2016. Impact: more than 412.2 million accounts.
  4. eBay: Date May 2014. Impact: 145 million users compromised.
  5. Equifax: Date July 29 2017. Impact: Personal information
    (including Social Security Numbers, birth dates, addresses, and in some
    cases drivers' license numbers) of 143 million consumers; 209,000
    consumers also had thier credit card data exposed.
  6. Heartland Payment Systems: Date March 2008. Impact: 134 million
    credit cards exposed through SQL injection to install
    spyware on Heartland's data systems.
  7. Target Stores: Date December 2013. Impact: Credit/debit card
    information and/or contact information of up
    to 110 million people compromised.
  8. TJX Companies, Inc.: Date December 2006. Impact: 94 million credit cards exposed.
  9. Uber: Date Late 2016. Impact: Personal information of 57 million Uber
    users and 600,000 drivers exposed.
  10. JP Morgan Chase: Date July 2014. Impact: 76 million households and 7 million small businesses.
  11. US Office of Personnel Management (OPM): Date 2012-14. Impact:
    Personal information of 22 million current
    and former federal employees.
  12. Sony's PlayStation Network: Date April 20 2011. Impact: 77 million
    PlayStation Network accounts hacked; estimated losses
    of $171 million while the site was down for a month.
  13. Anthem: Date February 2015. Impact: Theft of personal information on
    up to 78.8 million current and former customers.
  14. RSA Security: Date March 2011. Impact: Possibly 40 million employee records stolen.
  15. Stuxnet: Date Sometime in 2010, but origins date to 2005. Impact:
    Meant to attack Iran's nuclear power program, but will
    also serve as a template for real-world
    intrusion and service disruption of power grids, water supplies
    or public transportation systems.
  16. VeriSign: Date throughout 2010. Impact: Undisclosed information stolen.
  17. Home Depot: Date September 2014. Impact: Theft of credit/debit
    card information of 56 million customers.
  18. Adobe: Date October 2013. Impact: 38 million user records.


Taylor Armerding
Contributing writer, CSO
CSO FROM IDG

Microsoft.com
LifeLock and Norton Google
Amazon
SQL Server Joel Osteen Ministries MySQL LifeLock and Norton
Mother of Perpetual Help Our Lady of Guadalupe Patron Saint of the Internet The Miracle Prayer
Prayer for Forgotten Soul Mayo Clinic National Breast Cancer Foundation, INC. Biz Buy Sell

St. Jude, glorious Apostle, faithful servant and friend of Jesus, Patron of things despaired of; pray for us. Amen.

Please pray for all those who have been, who are, or will be affected by COVID-19.

February 12th, 2020