NEW YORK & TEL AVIV, Israel--(BUSINESS WIRE)--Dyadic Security, a leader in advanced cryptography solutions, today unveiled its Encryption and Key Protection Suite featuring two complementary new solutions, Distributed Key Protection and Software-Defined Encryption. Powered by a multi-party computation (MPC)-based engine, Dyadic delivers powerful encryption, authentication and key protection with seamless deployment. Organizations of all sizes can now easily achieve effective, distributed protection of keys, credentials and data in any IT environment—even in the event of a breach.
“Dyadic’s unique, software-only Encryption and Key Protection solution provides HSM-like security that is highly relevant for today’s virtualized and cloud environments where hardware solutions aren’t easily supported,” said Evgeny Leib, development manager, Wix.com.
Dyadic Distributed Key Protection
Cyber criminals have
demonstrated time and again their proficiency at accessing private data
by finding and stealing crypto keys. Despite companies applying the
strictest encryption and perimeter security to their data, if the keys
are not hidden well – the data can, and likely will, be breached. Dyadic
answers this massive, unmet industry need to properly protect the keys
with its new software-based solution:
- Dyadic Distributed Key Protection is the only solution that protects encryption keys in a distributed way; randomly splitting and distributing keys between multiple servers, then continuously refreshing the distribution to ensure that there is never a single location where data can be compromised, or a single administrator or user who can access unencrypted information. Private keys are safe from rogue admins, stolen credentials, device compromise or any single zero-day or malware.
Dyadic Software-Defined Encryption
For countless
organizations, deploying encryption can seem daunting and a drain on
budget, time and resources. Dyadic offers the only available solution on
the market that allows developers with little or no understanding of
cryptography to be able to securely encrypt data easily in a simple,
guided and understandable process:
- Dyadic Software-Defined Encryption provides a simple way to do complex encryption. Guided by a wizard, users receive intuitive prompts to select which fields need protection, answer a few questions (i.e. “Is this a password field?” or “Are searches performed on this field?”) and Dyadic automatically generates encryption code to be used in applications.
“For e-commerce providers, our customers are top priority and this means, among other things, protecting our web servers to safeguard sensitive client data,” said Gil Margolin, CTO at Talkspace.com. “To answer our need for effective encryption and key protection we turned to Dyadic for its unmatched cryptographic knowledge, years of academic research and advanced R&D in applied cryptographic solutions. Dyadic enables us to fulfill our encryption requirements in a simple, easy and guided way that saves time, costs and manpower.”
MPC Research Put to Practice
Dyadic is the only key
protection solution to base its patent-pending technology on decades of
research in the field of MPC, which is a subfield of cryptography with
the goal to create methods for parties to jointly compute a function
over their inputs while still keeping those inputs private from the
other parties. Two of the company’s co-founders, Professors Yehuda
Lindell (Bar-Ilan University, Israel) and Nigel Smart (University of
Bristol, UK) are leading authorities in the field of practical MPC.
“Dyadic enables organizations of all sizes to quickly and easily implement sophisticated encryption, authentication and key protection, which reduces risk, along with reducing the time, cost and resources required to achieve security and regulatory compliance,” said Avner Mor, CEO and Co-founder, Dyadic. “We combine the highest levels of security and usability, providing the most sophisticated and easy-to-use cryptographic solutions for distributed protection wherever data, keys and credentials are located—in mobile, virtual/cloud and on-premise environments. Our solutions are built on decades of academic research by two of the world’s leading cryptographers, and a proven mathematical foundation uniquely applied to IT security.”
Pricing and Availability
Dyadic’s Encryption and Key
Protection Suite is available now. For more information, please visit https://www.dyadicsec.com/.
About Dyadic Security
Founded by leading cryptographers and
cyber-security industry veterans, Dyadic protects data against hackers
with an extremely secure solution for data encryption, key protection
and authentication that is easy to use and integrate into existing
processes. The company’s flagship product, Dyadic Distributed Key
Protection, based on multi-party computation (MPC), provides uniquely
robust data encryption, and ensures reliable data security by randomly
splitting encryption keys among multiple servers, ensuring that there is
no single point of vulnerability. Dyadic’s advanced technology protects
data from external threats, rogue administrators, privileged credentials
theft, zero-day attacks and misuse. The company is privately funded. For
more information, please visit https://www.dyadicsec.com/.
Follow Dyadic on Twitter,
Facebook
and connect on LinkedIn.