Cy4Secure Arbiter Datasheet

Data Security Gateway Datasheet

Software Development Kit Datasheet

Cy4Secure [ sahy-fer si-kyoor ] or “CSA” is the backbone of Bonafeyed’s data defined security technology and responsible for authenticating users, and creating, suppling and safeguarding 800-bit and 256-bit cryptographic keys. It is available as a cloud service or software license.

Read the datasheet >
Bonafeyed’s Data Security Gateway or “DSX” can be leveraged to integrate legacy software or devices or as the fastest no-code adoption path to Bonafeyed’s data define security solution. DSX is deployed in a cluster of 3 or more instances depending on the number of users and applications.

Read the datasheet >
Bonafeyed’s SDK allow developers to add transparent no-touch data protection to their applications, webApps or dataApps.

Read the datasheet >

Data Defined Security Brief

Data-In-Use Protection Brief

Data Security Domain Brief

Bonafeyed views data security holistically. Our “Data Defined Security” approach ensure the customer’s data is never touched by Bonafeyed, data and decryption keys only converge on authorized devices. Data is individually encrypted requiring many keys to access a single data record and operates with existing applications and deployments.

Read the Brief >
Advances in data security has predominantly occurred for “data-in-transit” and “data-at-rest”. Bonafeyed gives unparalleled “data-in-use” protection for databases. This means databases or applications backed by databases are given the ability to operate and query encrypted data without changes to the DBMS or its infrastructure. Learn how Cy4Secure allows full relational operations on database management systems.

Read the brief >
Once protected data leaves the owner’s security or network domain, they effectively lose control of the data. Typically, data is delivered in the clear or as plain text on the end-point machines from an application. Bonafeyed, allows encrypted data to remain protected as it traverses different domains or users but still gives full control to accessibility by the owner. Learn how we safeguard data after it leaves the application’s domain.

Read the brief >

Split-Path Scalability Brief

Scalability and performance are hallmarks of Cy4Secure’s architecture. This comes from separating the application data paths from managing its security. The delivery and communication of an application remains the same and untouched, no bump-on-wire, servlets, or intermediate choke points. Authorization, cipher key delivery, and cryptographic operations are independent and decentralized to the endpoint devices. This gives Cy4Secure unparalleled performance and security.

Read the brief >

Encrypted Data Searches Brief

Learn how Bonafeyed allows common databases to operate with encrypted data without changes to the DBMS or requiring special client-side drivers or search engines. Fully relational searches including exact match, starts-with, contains, and ranged relational operations such as filters, joins and sorts also remain functional with imperceptible impacts to performance or functionality.

Read the brief >

Cy4Secure Architecture Brief

See what makes Bonafeyed work from the inside. The Cy4Secure Arbiter is at the heart of the data defined security technology. The concept is simple but very powerful to ensure users are authenticated on any of their end-point devices. It quickly creates and delivers crypto keys on demand, protects its secrets behind a world class “air-gap” technology, and utilizes machine learning to prevent zero-day vulnerabilities.

Read the brief >

Cy4Secure Performance and Certification Brief

Whether using the industry standard AES-256 symmetric block cipher or Bonafeyed’s innovative 800-bit stream cipher both meet National Institute of Standards and Technology (NIST) FIPS 140-2 part 1, four statistical random number generator tests. Performance is another important attribute where Cy4Secure excels ensuring users’ experience is not impacted. Review performance comparisons and certification tests.

Read the brief >

Exceed Data Privacy Regulations

Secure 3rd party Database backed SaaS Applications

Protecting Live Databases

General Data Protection Regulation (GDPR) is nearing its third enforcing anniversary. The European Union blazed the trail of data privacy and now has become a model for many governments. What is common between these regulations is requirements to protect personal information (PII) that identifies a person. They also require this information to be controlled and protected. The ability to tightly manage who has access to PII records and encrypt individual fields of a PII record, gives Cy4Secure unmatched data protection. A single record can take dozens of cipher keys to decrypt. Breached or stolen data only provides cybercriminals with unintelligible digital data. Learn how Bonafeyed’s approach exceeds data privacy mandates and regulations.

Read the application brief >
A dataApp is a cloud application backed by a database. Software as a service applications such as Enterprise Resource Planning (ERP), Customer Relations Management (CRM), Human Resource management (HRM), and Service Desk Management, are essentially dataApps running on top of a database. It is this fact that allows Cy4Secure to encrypt and protect data stored and searched in the cloud. External, insider, and accidental breaches of this data can now be protected and controlled by the owner.

Read the application brief >
Fundamentally a database only knows data in its digital form. It does not know the difference if the data is English, German, French or Italian. However, queries must be in the same language for which is stored in the database. This is the basic concept that allows Bonafeyed to encrypt data fields and make them searchable. Read why protecting a database from the inside out is the most effective approach to preventing unauthorized access down to a single record or field.

Read the application brief >

Demonetize Breached Data

Stop Data Leakage

Databases that have been breached by cybercriminals provide at least two means to extort compensation from the afflicted business. Ransomware is the first opportunity. But even after the enterprising criminals give the victims back control of their computing environment, the real prize is the database. The Dark Web now commonly posts 1000’s of databases for sale to the highest bidder. If the data is encrypted within the database, cybercriminals will see this and move on to those enterprises that have not deployed Cy4Secure. Read more about how this is a growing trend and how it can cost twice as much to recover from a breach.

Read the application brief >
Data being revealed accidentally or made easily available to cybercriminals without effort is known as a data leak and is generally the result from poor data security. Alternate solutions that mask or tokenize data just eliminate information from databases making them useless for analytics. Encrypting sensitive data in place protects data from leaks while allowing full informational data analysis and searchability.

Read the application brief >

Safeguarding FinTech Operations

Surpass HIPAA and PHI Data Privacy Requirements

Manufacturing Supply-Chain Data Protection

US operating requirements related to financial activities have been regulated since 1933 and modernize in 1999. Privacy is mandatory and governs the collection, disclosure, and protection of consumers' personally identifiable information or PII. Financial Technology or FinTech advances financial services by using modern technologies to replace or enhance traditional financial systems. This also requires customer information shared between services, agents, and partners to be protected and controlled. Learn how Cy4Secure can be the catalyst to safeguarding data services and operations in the FinTech business model.

Read the market use case >
HIPAA or the Health Insurance Portability and Accountability Act of 1996 is a US federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. From this, the US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule. Learn how Cy4Secure protects patient’s data when shared between medical professionals, following a breach, and amongst business services.

Read the market use case >
An efficient and successful supply chain collaborates 100’s to 1000’s of partners. Accessibility to centralized ERP systems is the catalyst for fast communications and coordination. But it also opens the opportunity for unintentional and unlawful data exposures. Bonafeyed’s data defined security approach gives manufactures the ability to share critical protected data on the cloud from database backed applications and between its partners and suppliers without losing security controls. Read how suppliers and sub-contractors are a target for cybercriminals and how ERP systems can be protected by Bonafeyed.

Read the market use case >

Protecting Core Computing Banking Services

Financial institutions in the United states can be loosely categorized into three groups: large banks, community banks, and credit unions. Community banks and credit unions have assets under $500 million and under $100 million, respectively. Because of their limited resources, core computing services came to market offering affordable backend operations by aggregating many banks and achieving economies of scale. This brings challenges to separate and secure client data. Learn about data security vulnerabilities, indirect threats and how Bonafeyed adds a new level of data protection.

Read the market use case >

Retail Customer Management

e-tailers and their traditional counter parts, brick and mortar retailers, are constantly at risk of losing their most valuable assets, data information representing interactions with its past, current, and potential customers to digital thieves. Leaky CRM databases, human error, missed system updates all play a factor in customer PII data breaches. The loss leads to reduced customer confidence, government penalties, extortion, and possibly business closure. Read how Bonafeyed protects these assets and ensures when data is pilfered only unintelligible data bits are taken.

Read the market use case >

Online Video Gaming CRM/ERP Protection

There are now over 2.5 billion gamers across the globe spending 100’s of billions of dollars annually. This level of spending unfortunately catches the attention of the dark web players. Accessing not only the PII information but the login and password credentials is a valued target. This sensitive information typically resides in classic CRM and ERP databases. Bonafeyed encrypts these data types to safeguard from unauthorized insiders and external data mining attacks by making the information unintelligible data bits. Access to the data can be controlled down to a user’s gaming platform, various employer departments and individual employees. Leveraging the data defined security approach can make the gaming world a safer place to play.

Read the market use case >

Adopting a Data-Defined Approach

Classic database protection gives a False Sense of Security

Comprehensive data protection entails examining the use and lifecycle of data. Today’s cybersecurity solutions offer a myriad of perimeter-based technologies that strive to block cybercriminals’ access to the systems holding the valuable data. In other words, as long as data remains in the same security domain and access credentials are not stolen, a business’ data assets remain secure. Proof seen in the daily news on data breaches is evidence a more complete data security approach is needed. Bonafeyed’s “Data-Defined Security” is based on a philosophy of protecting data from creation, while in use, in transit, at rest, and when shared. Read how adopting this technology ensures data protection beyond a business classic security boundary.

Read the datasheet >
The business of data security is traditionally built on a combination of data-in-transit and data-at-rest protection technologies. For databases, this means using SSL or TLS transport protocols to protect data inflight or Transparent Data Encryption, TDE, for data placed in non-volatile storage. The only problem is that data remains in the clear or plain text when unauthorized queries are made to a DBMS. In other words, neither of these approaches stops data breaches and gives data owners a false sense of security. Bonafeyed approach protects data! Not systems that uses it ensuring its security and access control no matter where it resides.

Read the datasheet >