Game-Changing Cyber Security Technology

Protecting electronically stored data has become crucial in the battle against cyber attacks and criminal hacking. Ideally, files should only be unlocked by your own secure personnel and agreed client/customer operations. A cyber security startup has just launched an innovative technology that could change the very nature of data security. 

Keyavi Data has launched four apps that provide significant protection for commercial and government data. Keyavi's data intelligence technology enables data owners to maintain full control of their data for as long as they want. Independent of platform, transport or application, Keyavi protection works wherever that data travels or how it is stored, no matter the data type or format.

Using new iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection and self-awareness security.The company's technology uses a unique combination of industry standard tools and proprietary methods and protocols, which allows data to stay under the owner's control, no matter where it goes in the world or who possesses it at any given moment.

Once a Keyavi app is installed, a licensed user of Keyavi's security products can transform any type of data file into intelligent data, whether it's an email, Word document, text file, spreadsheet, pdf, video, or any other file type.  The app can infuse powerful and permanent controls into the data, including :

  • Who is allowed to see it,
  • ​When and where it is accessed
  • By whom and on what devices

Users can then send those multi-layered, encrypted files to anyone inside or outside their organisation, knowing thar their data will stay under control even after leaving their possession.

Before sharing an intelligent Keyavi-infused file, customers choose to either grant or refuse access for specific individuals or groups of people by geographic location as well as set specific date and time limits, or any combination thereof, for accessing the file. Because the owner can also change or revoke permission parameters on the fly from his or her smart device or computer at any time, the data always stays under the owner's control, regardless of where the data is located or who has it, forever. 

Should an unauthorised user try to gain access or steal data without appropriate permissions, the data self-protects, much like a 'Mission Impossible' self-destructing taped message.

Keyavi's new technology is intended for use by major companies in hospitality, gaming, financial services, law firms, technology and manufacturing. Federal, state and local governments are also in various stages of evaluation and deployments. With a name inspired by the Italian word for key, Keyavi is laser-focused on providing companies the power to eradicate the threat of data loss or intrusion.  

Help Net Security:        Yahoo Finance:      Business Wire:

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« The Market For Remote Desktop Software Is Set To Boom
N. Korean Hacking Group Has New Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.