Code
.NET Example
Add the CipherObject’s SDK to your application using NuGet. Then it’s as simple as:
// Attributes on data class
public class Patient
{
public int Id {get; set;}
[Secure]
public string FullName {get; set;}
[Secure]
public string SocialSecurityNumber {get; set;}
}
// myPatient is of type Patient
// Encrypt and sign the object before sending
myPatient.seal();
// Decrypt and verify the object after fetching
myPatient.unseal();
Java Example
Install the CipherObject SDK to your application using Maven. Then it’s as simple as
// Annotations on data class
public class Patient
{
private int Id
@Secure
private String fullName;
@Secure
private String socialSecurityNumber;
}
// myPatient is of type Patient
// Secure the object before sending
CipherObject.seal(myPatient);
// Decrypt and verify the object after fetching
CipherObject.unseal(myPatient);
It’s that easy!
See It In Action (3 Minute Video)
CipherObject in the Cloud
Despite their excellent infrastructure, most cloud storage, big data analytics or machine learning technologies do NOT provide robust data-at-rest security. Traditional data stores keep data and encryption keys on the same server, right next to each other. Since you do not own or maintain the database servers, the cloud providers will always have administrative access to your data.
The bottom line is that data stored in the cloud is inherently insecure. In order to achieve true data security, you need to encrypt your sensitive data at the source before it ever leaves your server application.
Surveys and reports all point out that the #1 reason why companies cannot benefit from cloud computing is because of security and privacy concerns, especially when dealing with sensitive data such as medical records or financial information.
Don’t let your organization miss out on the cloud! With CipherObject you’re in control of your data, regardless of where it’s stored. The encryption keys are stored on a separate server and encrypted themselves with elliptic curve cryptography.
CipherObject works with any cloud provider including
CipherObject on Premises
For on-premise or hybrid applications, CipherObject provides multiple layers of encryption that are essential for defense-in-depth and secure-by-designs principals through application layer encryption.
Lower maintenance and higher reliability will attract more and more organizations towards a pure public cloud solution. In the meantime, CipherObject’s strong encryption and automatic key management helps out in almost every situation
Key Management and more with Crypteron
CipherObject integrates with Crypteron’s security platform which handles key management, multiple security partitions, access control rules, auditing, key rotations, key migrations and more. Crypteron encrypts your encryption keys and stores them separately from the application and your data, so your data is always secure.
Crypteron’s security platform includes an easy-to-use dashboard at my.crypteron.com.
View all of your Apps
Each App can be optionally divided into multiple Security Partitions
Each Security Partition has an Access Control List where you can specify roles and permissions
Compliance in the Cloud
CipherObject makes it possible to deploy your application to the public cloud while also complying with your organization’s security policy or 3rd party standards such as HIPAA, PCI, FIPS-140-2, CJIS / Law Enforcement, FISMA, EU Data Protection and more.
HIPAA Compliance
CipherObject satisfies sections of the Security Standards and Safeguards under HIPAA. Security and privacy of patient medical records is impossible to achieve in the cloud paradigm without encryption. If you properly encrypt your data and a data breach takes place, you are not liable for negligence
PCI Compliance
Any company that touches credit card information, must secure that data in order to be PCI compliant. If the data is stored in a database, it must be encrypted within the storage medium and the encryption keys must be properly managed. Failure to do so cause the vendor to be stripped of its ability to accept credit cards and be subject to hefty fines.
CipherObject Makes Compliance Simple
In order to be compliant, most organizations either abandon the public cloud or build their own encryption infrastructure which takes a tremendous amount of time, resources, and technical expertise. CipherObject provides the best of both worlds, allowing you to take advantage of the cloud while taking care of the entire process of encryption, key management and key migrations. Your team can now focus on your core business and not waste time and resources solving a problem already solved and solved well.
Under the Hood
Briefly stated, CipherObject uses FIPS-140-2 certified elliptic curve cryptography and AES 256 bit in the latest GCM mode to protect your data. The encryption is so robust that even the National Security Agency (NSA) recommends it for the protection of government and military classified information. In fact AES256-GCM is even permitted to encrypt sensitive data classified as “TOP-SECRET” – the highest classification level possible. CipherObject’s use of 521-bit elliptic curve cryptography is stronger than 15,000-bit RSA. With CipherObject you get that level of encryption with marginal overhead – just about 1 ms per record containing multiple encrypted fields. Plus database operations usually travel over a network, which means the real world performance is almost the same as using no encryption at all. The technical specification document can be found here. More details can be found in our developers guide.