Defense Against Insider Attacks

Discreet Edge is a unique patent-pending technology that revolutionizes key management for the purposes of
cyber security and data privacy

BENEFITS

Why Discreet Edge?

Discreet Benefits 1
Insider Attacks Mitigation

Mitigation of the unsolved problem of insider threats

Discreet Benefits 2
Data Privacy Compliance

A proprietary solution for a new generation of data privacy requirements.

Discreet Benefits 3
Scalable Solution

Cost-effective, scalable to millions of users/devices in the realm of IoT.

Discreet 02
Discreet 01
Discreet 03
Insider data breach survey 2019

Insider Threat Market Opportunity

The two main actors in data breach:

  • Malicious Insider
  • Accidental Insider

 

Businesses in the US encounter about 2,500 internal security breaches daily.

66% of organizations consider malicious insider attacks or accidental breaches more likely than external attacks.

Over the last two years, the number of insider incidents has increased by 47%.

The cost of insider threats (related to credential theft) for organizations in 2020 is $2.79 million.

Insider threat stats reveal that more than 70% of attacks are not reported externally.

Discreet Edge In Action

Discreet Edge vs Status Quo

Conventional Approach1

Status Quo

Leakage of Master Key can compromise the security of the entire data

Extremely cumbersome and error-prone SOPs

Very heavy reliance on manual checks and balances – human factors

Very high learning curve – scarcity of trained human resources

Heavy reliance on logging and audit – many a times the problem is detected after-the-fact

Discreet Edge Approach

No single Master Key needs to be protected through obfuscation

All keys are secured through encryption – not through hiding/obscurity

Data Owner can be any trusted member of the team and is not required to have any technical skills

Access to each data set (segmented data) is controlled by different data owner (DO)

Keys are accessible to all authorized users

Keys are not accessible to any unauthorized user, including system administrators

Keys cannot be reverse-engineered

Discreet Edge Approach
Defense Against Insider Attacks

Major Benefits

Effective protection against the unaddressed challenge of insider threats

Fraction of the cost of current solutions

Backup without fear of leakage

Simple disaster recovery

Discreet edge major benefits 2

Simplified SOPs

Very low reliance on manual checks and balances

Very low reliance on logging and audit

Easier to learn – Availability of trained human resources

Discreet Edge

Salient Features

  • Isolation of system administrator/DBA form secured data/keys
  • No Unauthorized Access to the keys and Data
  • Fine-grained control of key usage – the principle of least privilege (PoLP)
  • Each Entity is encrypted by a unique key which is managed
    and protected separately
  • Removed the concept/need of a Master Key altogether
  • No limit on the number of keys and number of users
  • Comprehensive Key/User/Asset Catalog/Controller
  • Cloud-neutral solution
  • Can transparently manage, share, and port encryption keys across multiple cloud environments
Discreet Edge Salient Feautures
Discreet Edge

Target Markets

Enterprise Data Security

Automotive (Autonomous Vehicles)

  • GDPR
  • HIPAA
  • China’s Personal Information Protection Law
  • CAP 486 (Hong Kong Privacy Law)
  • CCPA (California Consumer Privacy Act)

Medical Devices

IoT/IIoT

FinTech

Blockchain

Crypto Wallets

Zero Knowledge

Discreet Edge in Action

Discreet Edge's Applications

Enterprise

Coming Soon

IoT

Internet of Things

Healthcare

Coming Soon

Get your data protected

Contact Us

Get the most comprehensive data security solution in the world today!