Game-Changing Cyber Security Technology

Protecting electronically stored data has become crucial in the battle against cyber attacks and criminal hacking. Ideally, files should only be unlocked by your own secure personnel and agreed client/customer operations. A cyber security startup has just launched an innovative technology that could change the very nature of data security. 

Keyavi Data has launched four apps that provide significant protection for commercial and government data. Keyavi's data intelligence technology enables data owners to maintain full control of their data for as long as they want. Independent of platform, transport or application, Keyavi protection works wherever that data travels or how it is stored, no matter the data type or format.

Using new iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection and self-awareness security.The company's technology uses a unique combination of industry standard tools and proprietary methods and protocols, which allows data to stay under the owner's control, no matter where it goes in the world or who possesses it at any given moment.

Once a Keyavi app is installed, a licensed user of Keyavi's security products can transform any type of data file into intelligent data, whether it's an email, Word document, text file, spreadsheet, pdf, video, or any other file type.  The app can infuse powerful and permanent controls into the data, including :

  • Who is allowed to see it,
  • ​When and where it is accessed
  • By whom and on what devices

Users can then send those multi-layered, encrypted files to anyone inside or outside their organisation, knowing thar their data will stay under control even after leaving their possession.

Before sharing an intelligent Keyavi-infused file, customers choose to either grant or refuse access for specific individuals or groups of people by geographic location as well as set specific date and time limits, or any combination thereof, for accessing the file. Because the owner can also change or revoke permission parameters on the fly from his or her smart device or computer at any time, the data always stays under the owner's control, regardless of where the data is located or who has it, forever. 

Should an unauthorised user try to gain access or steal data without appropriate permissions, the data self-protects, much like a 'Mission Impossible' self-destructing taped message.

Keyavi's new technology is intended for use by major companies in hospitality, gaming, financial services, law firms, technology and manufacturing. Federal, state and local governments are also in various stages of evaluation and deployments. With a name inspired by the Italian word for key, Keyavi is laser-focused on providing companies the power to eradicate the threat of data loss or intrusion.  

Help Net Security:        Yahoo Finance:      Business Wire:

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« The Market For Remote Desktop Software Is Set To Boom
N. Korean Hacking Group Has New Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: Enhance Your Cloud Security With EDR &NDR

WEBINAR: Enhance Your Cloud Security With EDR &NDR

Thursday, 19 May, 2022 - Join this webinar to learn how to apply endpoint and network detection and response (EDR/NDR) concepts to your cloud asset protection strategy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81 / Black Hat On-Demand Webinar

Perimeter 81 / Black Hat On-Demand Webinar

Black Hat On-Demand Webinar - Identity is the New Perimeter: This webinar will provide you with vital insights to help understand the need for Zero Trust and how it can transform your network.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.