top of page

CyberFit

Guarding your remotely-accessible database is your biggest challenge -- and your most alarming vulnerability. Large organizations manage thousands of data access admissions, thousands of data-write and data-rewrite permissions. One 'rotten apple' will bring down a large bank, or a big store chain. You face an alarming chance that one of your thousands of bona fide users has become a phishing victim and their credentials are now being used by a wily hacker contaminating your database, and doing it smartly so that for the longest time you don't even suspect that you have been compromised, and that malware hides in your systems.

The market is full of 'alarm software' that does not point to the problem specifically, just tells you that "something is wrong". Those tools that point to where the problem is, often leave you to find a solution on your own. And so many other protective software packages simply add many layers of interactive security dialogues that your users are reluctant to log in, and when they are in, they stay in idle (and vulnerable) because it is so difficult to get back in later.

That is the cyber security background that opens the door to CyberFit. The underlying idea is simple: users who enter data into the database, do not know how the data looks like when written and stored. Therefore they cannot enter malware hidden as innocent data entry. We use threat-responsive pattern-devoid encryption that stores the data encrypted in a cipherformat that is responsive to the threat associated with the written data. We call it 'Elastic Encryption'. Each data field written into the database is associated with an AI computed threat metric that determines how robust will the protective storage encryption operation be. The greater the threat, the stronger the encryption.

Although no keys are changed, each time the very same data is written into the database, what is actually stored is different. The magic of Pattern-Devoid Encryption (PDE) is assuring that real time randomness keeps the cipher format unpredictable even by the deeply engaged system engineers, so even if one of them is a 'rotten apple' -- they find a resistant system.

All this is kept under the hood. The user is not bothered, neither the writer, nor the reader of the data. The data appears neatly organized, clearly displayed, on screens and printouts, only the 'belly of the beast' houses the defensive format of your most precious organizational asset: your corporate data.

Let's talk: Prof. Gideon Samid, PhD, PE. *. Gideon@BitMint.com
Testor_J6201.png
CyberFit.host
bottom of page