NEW YORK & TEL AVIV, Israel--(BUSINESS WIRE)--Dyadic Security, a leader in advanced cryptography solutions, today unveiled its Encryption and Key Protection Suite featuring two complementary new solutions, Distributed Key Protection and Software-Defined Encryption. Powered by a multi-party computation (MPC)-based engine, Dyadic delivers powerful encryption, authentication and key protection with seamless deployment. Organizations of all sizes can now easily achieve effective, distributed protection of keys, credentials and data in any IT environment—even in the event of a breach.
“Dyadic’s unique, software-only Encryption and Key Protection solution provides HSM-like security that is highly relevant for today’s virtualized and cloud environments where hardware solutions aren’t easily supported,” said Evgeny Leib, development manager, Wix.com.
Dyadic Distributed Key Protection
Cyber criminals have demonstrated time and again their proficiency at accessing private data by finding and stealing crypto keys. Despite companies applying the strictest encryption and perimeter security to their data, if the keys are not hidden well – the data can, and likely will, be breached. Dyadic answers this massive, unmet industry need to properly protect the keys with its new software-based solution:
- Dyadic Distributed Key Protection is the only solution that protects encryption keys in a distributed way; randomly splitting and distributing keys between multiple servers, then continuously refreshing the distribution to ensure that there is never a single location where data can be compromised, or a single administrator or user who can access unencrypted information. Private keys are safe from rogue admins, stolen credentials, device compromise or any single zero-day or malware.
Dyadic Software-Defined Encryption
For countless organizations, deploying encryption can seem daunting and a drain on budget, time and resources. Dyadic offers the only available solution on the market that allows developers with little or no understanding of cryptography to be able to securely encrypt data easily in a simple, guided and understandable process:
- Dyadic Software-Defined Encryption provides a simple way to do complex encryption. Guided by a wizard, users receive intuitive prompts to select which fields need protection, answer a few questions (i.e. “Is this a password field?” or “Are searches performed on this field?”) and Dyadic automatically generates encryption code to be used in applications.
“For e-commerce providers, our customers are top priority and this means, among other things, protecting our web servers to safeguard sensitive client data,” said Gil Margolin, CTO at Talkspace.com. “To answer our need for effective encryption and key protection we turned to Dyadic for its unmatched cryptographic knowledge, years of academic research and advanced R&D in applied cryptographic solutions. Dyadic enables us to fulfill our encryption requirements in a simple, easy and guided way that saves time, costs and manpower.”
MPC Research Put to Practice
Dyadic is the only key protection solution to base its patent-pending technology on decades of research in the field of MPC, which is a subfield of cryptography with the goal to create methods for parties to jointly compute a function over their inputs while still keeping those inputs private from the other parties. Two of the company’s co-founders, Professors Yehuda Lindell (Bar-Ilan University, Israel) and Nigel Smart (University of Bristol, UK) are leading authorities in the field of practical MPC.
“Dyadic enables organizations of all sizes to quickly and easily implement sophisticated encryption, authentication and key protection, which reduces risk, along with reducing the time, cost and resources required to achieve security and regulatory compliance,” said Avner Mor, CEO and Co-founder, Dyadic. “We combine the highest levels of security and usability, providing the most sophisticated and easy-to-use cryptographic solutions for distributed protection wherever data, keys and credentials are located—in mobile, virtual/cloud and on-premise environments. Our solutions are built on decades of academic research by two of the world’s leading cryptographers, and a proven mathematical foundation uniquely applied to IT security.”
Pricing and Availability
Dyadic’s Encryption and Key Protection Suite is available now. For more information, please visit https://www.dyadicsec.com/.
About Dyadic Security
Founded by leading cryptographers and cyber-security industry veterans, Dyadic protects data against hackers with an extremely secure solution for data encryption, key protection and authentication that is easy to use and integrate into existing processes. The company’s flagship product, Dyadic Distributed Key Protection, based on multi-party computation (MPC), provides uniquely robust data encryption, and ensures reliable data security by randomly splitting encryption keys among multiple servers, ensuring that there is no single point of vulnerability. Dyadic’s advanced technology protects data from external threats, rogue administrators, privileged credentials theft, zero-day attacks and misuse. The company is privately funded. For more information, please visit https://www.dyadicsec.com/. Follow Dyadic on Twitter, Facebook and connect on LinkedIn.