Data Security Matters

Data Security Breaches Cost The Global Economy 400 Billion Per Year1

How much does your data exposure cost you?

Smart Data Security
AES 256-bit encryption makes data an asset, not a liability.
Proactive Protection
Avoid the risk, the cost to rebuild after a cybercrime is 8.5 billion2.
Compliant
Meets HIPAA, SOX, GLBA, HITECH, PCI-DSS, and FCC CPNI regulations.
Trusted and Valued
Proudly supporting the U.S. Military and U.S. Government.

 

WHAT IS THE VALUE OF YOUR DATA?

Data is your company's most valuable asset.  If stolen or lost, your organization risks loss of revenue, legal and compliance implications, and a loss of reputation. The cost to recover your data from a breach or loss is exponentially more expensive than the cost to protect the data in the first place.


 

DATA SECURITY MATTERS

With data security threats on the rise, detection and prevention are critical to ensure business networks are safe from unwanted visitors. Such threats go unnoticed until significant damage has already been done. Taking steps to ensure that customer, personal employee, research and development (R&D) and confidential data remains safe and secure can save your organization from financial loss, a damaged reputation and a PR disaster. 

Ciphertex Data Security has solutions to strategically protect your important sensitive data. From the smallest single drive to our full scale 60-bay rack mount NAS server, our products are equipped with enterprise data protection features, like hardware based AES 256-bit encryption and RAID protection. Ciphertex products have gone through rigorous testing to ensure our solutions meet all data privacy standards. We specialize in data security and our products are designed to prevent threat exposure and increase productivity.

matters

encription

ADVANCED ENCRYPTION STANDARD (AES)

AES is a data protection algorithm engineered to translate normal data into a proprietary or “secret” code which requires a “key” to decipher. Recognized by the United States government and governments around the globe and unbreakable by even the fastest supercomputers combined, it is the preferred standard for protecting highly classified documents.

HARDWARE ENCRYPTION

In contrast with slow and inconvenient software encryption, hardware encryption is a reliable and fast solution. Hardware encryption uses a dedicated processor physically located on the drive allowing for better system performance. The encryption is tied to a specific device, so encryption is “always on”. 

Hardware encrypted drives are not subject to updates, proving to be a more cost-effective and easily scalable option. These key factors make securing data substantially quicker and more efficient.

hardware

compliance

COMPLIANCE

There are various laws, regulations and guidelines that address security and privacy. From FIPS 140-2 to HIPAA and HITECH, businesses today must integrate these regulations into their security standards. Ciphertex is fully compliant with the following industry regulations.

  • U.S. Federal Communication Commission’s (FCC) Customer Proprietary Network Information (CPNI) regulations
  • U.S. Federal Information Processing Standards (FIPS) 140-2 compliant data-at-rest and data-in-motion encryption
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Health Information Technology for Economic and Clinical Health Act (HITECH)
  • Payment Card Industry Data Security Standard (PCI-DSS)
  • Gramm-Leach-Bliley Act (GLBA), or the US Financial Modernization Act
  • Sorbanes-Oxley Act (SOX)

What Proactive Data Security Solution Does Your Business Need?

 

  Single Drive NAS Ranger
(Secure RAID)
Rackmount Thunderbolt (MAC)
Encryption (AES 256-bit)  ✓  ✓  ✓  
RAID  
Business Continuity & Disaster Recovery (Real-time remote replication)    
Client Security (SMB3, HTTPS, IPSec)        
User Security (Access Control)