Game-Changing Cyber Security Technology

Protecting electronically stored data has become crucial in the battle against cyber attacks and criminal hacking. Ideally, files should only be unlocked by your own secure personnel and agreed client/customer operations. A cyber security startup has just launched an innovative technology that could change the very nature of data security. 

Keyavi Data has launched four apps that provide significant protection for commercial and government data. Keyavi's data intelligence technology enables data owners to maintain full control of their data for as long as they want. Independent of platform, transport or application, Keyavi protection works wherever that data travels or how it is stored, no matter the data type or format.

Using new iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection and self-awareness security.The company's technology uses a unique combination of industry standard tools and proprietary methods and protocols, which allows data to stay under the owner's control, no matter where it goes in the world or who possesses it at any given moment.

Once a Keyavi app is installed, a licensed user of Keyavi's security products can transform any type of data file into intelligent data, whether it's an email, Word document, text file, spreadsheet, pdf, video, or any other file type.  The app can infuse powerful and permanent controls into the data, including :

  • Who is allowed to see it,
  • ​When and where it is accessed
  • By whom and on what devices

Users can then send those multi-layered, encrypted files to anyone inside or outside their organisation, knowing thar their data will stay under control even after leaving their possession.

Before sharing an intelligent Keyavi-infused file, customers choose to either grant or refuse access for specific individuals or groups of people by geographic location as well as set specific date and time limits, or any combination thereof, for accessing the file. Because the owner can also change or revoke permission parameters on the fly from his or her smart device or computer at any time, the data always stays under the owner's control, regardless of where the data is located or who has it, forever. 

Should an unauthorised user try to gain access or steal data without appropriate permissions, the data self-protects, much like a 'Mission Impossible' self-destructing taped message.

Keyavi's new technology is intended for use by major companies in hospitality, gaming, financial services, law firms, technology and manufacturing. Federal, state and local governments are also in various stages of evaluation and deployments. With a name inspired by the Italian word for key, Keyavi is laser-focused on providing companies the power to eradicate the threat of data loss or intrusion.  

Help Net Security:        Yahoo Finance:      Business Wire:

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« The Market For Remote Desktop Software Is Set To Boom
N. Korean Hacking Group Has New Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Zivver

Zivver

Zivver provide pioneering software that prevents data leaks when sending an e-mail, chat message or sharing a file.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

MPC Alliance

MPC Alliance

The mission of the MPC Alliance is to accelerate adoption of MPC (Multi-Party Computation) technology.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.