The Next Evolutionary Step in Securing the Cloud
Hard-key encryption, also known as hardware-based key management systems utilize strong encryption with military grade, AES 256 bit symmetrical keys. To qualify as a hardware-based key management system, keys must be generated with a hardware-based random number generator. Keys generated by software are not completely randomized and are therefore more vulnerable to brute force and other attacks. In addition, hard-key systems must provide a robust system of key distribution, revocation, and renewal that is not prone to the vulnerabilities of current software-based key management solutions.
Not only are hard-key systems with strong encryption secure. They are also fast, running as much as 20 times faster on a given piece of hardware than asymmetrical encryption alternatives.
"Anyone who considers arithmetical methods of producing random digits is, of course, in a state of sin."
J. von Neumann, 1951
GoldKey is a Hardware-Based Hierarchical Encryption Key Generation and Management Device.
GoldKey security tokens are based on hard-key encryption and management technologies. Inside each GoldKey USB token, is a powerful random number generator that is used to create keys for strong encryption. The GoldKey token also provides the hardware management system that allows users to set up their own security infrastructure that provides private key management to all of their computers allowing them to store files in the cloud, on local drives, or in secure vaults with the peace of mind that NO ONE will be able to gain access to their data.
In addition to the hardware random number generator, each GoldKey contains a powerful security processor and the GoldKey Core Technology (GCT). GCT provides the capability of managing symmetrical encryption keys securely, even over a network connection. This is done by creating a private security hierarchy for each user. With the private hierarchy, it is possible to create a very secure connection over the network. Since this very secure connection is established with hard-key technology, meaning with hardware-based encryption key management, the resulting secure connection is referred to as a Gold Pipe. Once the Gold Pipe has been established, it can be utilized to efficiently encrypt and transfer all types of data securely between devices.
In applications that require that groups of users have the ability of sharing encrypted files, a group security hierarchy can also be created. Group security hierarchies are created with a GoldKey Master token. Master tokens can manage and disable GoldKey tokens which have been registered to the Master during setup. Registered users can then be granted access to specified files under the control of the Master. The Master can also block access of any user to any files and circumstances may require.
Though an effective solution when invented 20 years ago, one-time passwords and certificate-based security is now vulnerable to brute force attacks and is no longer a good data protection solution.
Need a Custom
Call: (888) 663-2471