Data Security Domain

A security domain is generally a collection of computers, servers and users that are trusted to exchange data and are protected by network security filters, inspectors, and firewalls. However, when data leaves a security domain and enters another, it is by default not trusted and loses protection.


Bonafeyed perfectly bridges this dangerous gap.


Other solutions make use of transport protocols such as SSL (Secure Sockets Layer), TLS (Transport Layer Security), and VPN (Virtual Private Network) to stretch the boundary of the security domain and temporarily encompass visting machines to safely exchange data. Unfortunately, once the data leaves one security domain (source) to another (intermediate or destination), the sender now has to trust that the receving machine and its unknown environment will somehow keep the data safe.

Cy4Secure introduces the concept of a “data security domain” where once data is encrypted, it remains secure in its own domain and access can be controlled by the sender no matter where the data is shared. If Cy4Secure protected data is passed to intermediate applications/machines such as an email server or a cloud sharing storage the data remains encrypted and unusable if a breach occurs. Once at the sender’s destination the data remains encrypted until the recipient

is authenticated by Cy4Secure and authorized by the sender to access the data.

Even moving past the final destination, the Cy4Secure protected data remains secure. For example, backing up the recipient’s machine, moving the Backup to an archive or cold tier, or forwarding the protected data to a co-worker or another data security domain. For a mobile device such as a tablet or smartphone, it could be stolen along with the protected data. In all cases, when Cy4Secure protected data is lost, stolen, abandoned or forgotten, it remains secure and becomes permanently inaccessible once access is removed or retired ensuring cybercriminals or non-authorized users only obtain unintelligible data.



Multi-factor System Ensures Recipients are Authorized to View Protected Data