Game-Changing Cyber Security Technology

Protecting electronically stored data has become crucial in the battle against cyber attacks and criminal hacking. Ideally, files should only be unlocked by your own secure personnel and agreed client/customer operations. A cyber security startup has just launched an innovative technology that could change the very nature of data security. 

Keyavi Data has launched four apps that provide significant protection for commercial and government data. Keyavi's data intelligence technology enables data owners to maintain full control of their data for as long as they want. Independent of platform, transport or application, Keyavi protection works wherever that data travels or how it is stored, no matter the data type or format.

Using new iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection and self-awareness security.The company's technology uses a unique combination of industry standard tools and proprietary methods and protocols, which allows data to stay under the owner's control, no matter where it goes in the world or who possesses it at any given moment.

Once a Keyavi app is installed, a licensed user of Keyavi's security products can transform any type of data file into intelligent data, whether it's an email, Word document, text file, spreadsheet, pdf, video, or any other file type.  The app can infuse powerful and permanent controls into the data, including :

  • Who is allowed to see it,
  • ​When and where it is accessed
  • By whom and on what devices

Users can then send those multi-layered, encrypted files to anyone inside or outside their organisation, knowing thar their data will stay under control even after leaving their possession.

Before sharing an intelligent Keyavi-infused file, customers choose to either grant or refuse access for specific individuals or groups of people by geographic location as well as set specific date and time limits, or any combination thereof, for accessing the file. Because the owner can also change or revoke permission parameters on the fly from his or her smart device or computer at any time, the data always stays under the owner's control, regardless of where the data is located or who has it, forever. 

Should an unauthorised user try to gain access or steal data without appropriate permissions, the data self-protects, much like a 'Mission Impossible' self-destructing taped message.

Keyavi's new technology is intended for use by major companies in hospitality, gaming, financial services, law firms, technology and manufacturing. Federal, state and local governments are also in various stages of evaluation and deployments. With a name inspired by the Italian word for key, Keyavi is laser-focused on providing companies the power to eradicate the threat of data loss or intrusion.  

Help Net Security:        Yahoo Finance:      Business Wire:

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« The Market For Remote Desktop Software Is Set To Boom
N. Korean Hacking Group Has New Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Hotlava Systems

Hotlava Systems

HotLava network adapters enable today's powerful servers and workstations to deliver more productivity by reducing congestion at the network interface.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security is a cyber security technology consulting, incident response and applied research company.

National Center for Manufacturing Sciences (NCMS)

National Center for Manufacturing Sciences (NCMS)

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.