Game-Changing Cyber Security Technology

Protecting electronically stored data has become crucial in the battle against cyber attacks and criminal hacking. Ideally, files should only be unlocked by your own secure personnel and agreed client/customer operations. A cyber security startup has just launched an innovative technology that could change the very nature of data security. 

Keyavi Data has launched four apps that provide significant protection for commercial and government data. Keyavi's data intelligence technology enables data owners to maintain full control of their data for as long as they want. Independent of platform, transport or application, Keyavi protection works wherever that data travels or how it is stored, no matter the data type or format.

Using new iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection and self-awareness security.The company's technology uses a unique combination of industry standard tools and proprietary methods and protocols, which allows data to stay under the owner's control, no matter where it goes in the world or who possesses it at any given moment.

Once a Keyavi app is installed, a licensed user of Keyavi's security products can transform any type of data file into intelligent data, whether it's an email, Word document, text file, spreadsheet, pdf, video, or any other file type.  The app can infuse powerful and permanent controls into the data, including :

  • Who is allowed to see it,
  • ​When and where it is accessed
  • By whom and on what devices

Users can then send those multi-layered, encrypted files to anyone inside or outside their organisation, knowing thar their data will stay under control even after leaving their possession.

Before sharing an intelligent Keyavi-infused file, customers choose to either grant or refuse access for specific individuals or groups of people by geographic location as well as set specific date and time limits, or any combination thereof, for accessing the file. Because the owner can also change or revoke permission parameters on the fly from his or her smart device or computer at any time, the data always stays under the owner's control, regardless of where the data is located or who has it, forever. 

Should an unauthorised user try to gain access or steal data without appropriate permissions, the data self-protects, much like a 'Mission Impossible' self-destructing taped message.

Keyavi's new technology is intended for use by major companies in hospitality, gaming, financial services, law firms, technology and manufacturing. Federal, state and local governments are also in various stages of evaluation and deployments. With a name inspired by the Italian word for key, Keyavi is laser-focused on providing companies the power to eradicate the threat of data loss or intrusion.  

Help Net Security:        Yahoo Finance:      Business Wire:

You Might Also Read:

Too Many Employees Use Their Own Devices To Access  Corporate Data:

 

« The Market For Remote Desktop Software Is Set To Boom
N. Korean Hacking Group Has New Malware »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

Redport Information Assurance

Redport Information Assurance

Redport Information Assurance is an information assurance and cyber security solutions provider offering integrated business solutions for all levels of government.