ZenithSecure

ZenithVault Enterprise

ORDER NOW

About ZenithVault Enterprise

The purpose of this first of its kind security product is to provide clients with secure data storage using both hardware and software methods to achieve a maximum security data storage model.

ZenithVault is an auxiliary storage platform meant for extremely sensitive data; not simply a replacement of a conventional SQL database.

ZenithVault Enterprise is PCI compliant while providing protection from multiple forms of hacker attacks including 0 day attacks and brute force attacks. Such a high protection level is achieved because client's vital information is divided among multiple servers which run different operating systems. If an attacker controls one of these servers the data they have access to will be useless because it is only a partial amount of information.

Each and every secret will have a unique identifier and a password associated to it. The password is also subject to dividing so that if an attacker manages to control one of the storage servers, they will not be able to use the password to request the other parts of the secret from the other nodes. Attackers would have to breach at least 5 geographically distant servers, running different operating systems, with different application environments to be able to "see" the entire secret. Because even if your main application is compromised, the unauthorized user or attacker will only reach the data being run at that time, they will not have access to your entire database.

Data tokenization enables clients with secure and simple recurring billing capability. The billing data is forwarded from the storage nodes straight to the payment gateway, thus obtaining a one-way data flow. From the unsafe application the secret goes to the storage node and then it's sent out for processing, reducing the risks to almost zero. Custom integration can be achieved to suit any business model.

The ZenithVault Enterprise security system includes: high availability through fail-safe redundant nodes and safe auto recovery for affected nodes as well as custom payment gateway integration, penetration alarm and self-containment, one way data flow, custom data control, token based administration methods on custom built, read-only operating systems. It also has the ability to store large data objects.

It comes with libraries and functions ready to be implemented in several programming languages: Java, C#, Python, PHP and Ruby. The whole application provides a simple set of CRUD commands and the integration with your existing application will take only a few minutes. Please contact us for other languages as we will provide the libraries upon request, for free.

Trusted Platform Module (TPM) compatibility: this provides both platform integrity and disk encryption and can be integrated into the hardware nodes responsible for the storage of the divided and separated data. TPM is included with ZenithVault SaaS and our engineers are able to integrate it with the Freeware and Enterprise versions, upon request.

By deploying this system you are strengthening your security and buying your company precious time to mitigate any unauthorized access or malicious attacks with minimal damage. The Enterprise version delivers remote server’s communication using elliptical curve Diffie-Hellman encryption that is not man-in-the-middle vulnerable, compared to standard SSL encryption.

Read on to learn more about how this uniquely designed system will protect your company and its vital information.

TO TOP