top of page
Active Cypher logo. Upside down triangle with geometric pattern in multiple shades of teal. Next to it are the words "Active Cypher" in black.

Stay Informed with Active Cypher

Keep up with the latest news, best practices, and advice on cybersecurity to protect your organization’s critical data.

ree

Money or scalability keeping businesses of all sizes from adopting individual file encryption. Leaving their files exposed and vulnerable to internal and external leaks through antiquated technology, big names in retail, hospitality, tech, and entertainment have dominated the cybersecurity news for nearly a decade. We haven’t liked seeing this, so we did something about it. Active Cypher has built an enterprise-class individual file encryption solution at a low cost and easy user experience.


So, what’s out there already?


Full disk encryption (also known as full volume encryption), works by encrypting a system’s entire hard drive – Bitlocker has been the standard of full disk encryption for more than a decade. All the confidential data stored on it, but also the operating system and all applications. When the system is started, the user is prompted for the encryption key, which enables the system to decrypt enough to boot and run normally.


It operates at a lower level than encrypting individual files, using passphrases, PINs, devices, or other authentication to give access, something each individual has in hand, memorized, or, unfortunately, taped to the bottom of their keyboard. That sounds secure enough for most, but BitLocker only protects the file within the physical disk, but once the disk is decrypted and a file is sent outside that drive, there is nothing to prevent unauthorized users from reading the confidential data in the file.


It only takes one – a disgruntled employee, someone falling for a phishing scheme, or a burglar physically stealing the actual disk – for the information to be out there. The cloud won’t keep you safe either – it just means the disks are in another location, a data center somewhere else.


What’s the alternative?


Typical file encryption puts the onus on the end-user. It takes a lot of trust in each employee to meeting a company’s policies on determining which files get seen by who. While they still use passphrases, PINs, or easily compromised keys, it’s just as easy to send a low-level employee the annual budget by mistake. Between email, mobile phones, laptops, internal devices, collaboration software, and thumb drives, the wrong data can be opened by the wrong person and released out into the world. Universal adoption of consistent permissions in a growing organization gets increasingly more complex and harder to enforce.


And what does Active Cypher do about it?

95% of Fortune 1000 companies are running either Active Directory locally or in Microsoft Azure. Active Directory is so widely used it is de-facto for small, medium, and large business networks, not just enterprises. Active Cypher Cloud Fortress is deployed seamlessly within Active Directory, the most widely used network worldwide, making us the easiest to use, enterprise-class file encryption solution for businesses of all sizes.


Active Cypher File Fortress considers every file on shared networked folders as confidential and encrypts each one, in every folder, on your servers. We don’t use arbitrary templates, vague company policies, or guesswork to determine what needs to be protected. Easily categorize employees using Active Directory – individual users no longer have to decide who gets to see what. It’s as simple as retaining the Access Control List entries for each file, no matter where the file ends up. If someone in Sales gets an Accounting file, the ability to decrypt it will be denied.


Companies, and even departments, use a variety of services to share files – Dropbox, Microsoft OneDrive, Microsoft SharePoint, Slack, Google Drive, Box – and all are protected by Active Cypher Cloud Fortress because it relies on Active Directory’s Security Groups & Users to automatically allow or prevent decryption. By managing keys at the identity level, not the user level, individuals don’t need to remember passphrases, PINs, and recovery keys, plus you won’t find them scrawled on sticky notes. Open files seamlessly, without the hindrance of human error.


Active Cypher had a philosophy from the beginning – don’t build what’s not necessary. To make something simple requires time to reduce elements to their essence. We have done this by simplifying a process and removing the barrier to entry that once took days, distilling it into minutes. And price shouldn’t be what keeps any sized business from being secure. By keeping costs low per user, any business can use Active Cypher Cloud Fortress and we are proud of that.

  • Dec 11, 2019
  • 3 min read

Updated: Feb 1, 2023


ree

“If I see it–I can take it”


I am the CTO of a cyber-security software provider based in Southern California. I’ve always been mystified by the basic lack of security knowledge that pervades all companies, at all levels. Today I am addressing the average layman who deals with security, as a user. The next edition of this “security blog” will speak to the trained and educated IT professionals who must secure their companies from hacks and breaches.


Over these last five years, I have developed several fundamental laws of data protection principles, or “Gleason’s Principles”, that I use to describe to the non-tech, “average” person to use in their everyday business practices. I usually speak with the executive, senior-level manager, or business owner engaged with the responsibilities for the purchase and oversight of the Information Technology (IT) areas and operations of their business.

  • I want them to “really” understand this one very important principle or caveat, “if I see it–I can take it”. This refers to the everyday activity of going online and conducting business over the internet. The idea here is to convince them that whatever security fence they have placed around their businesses, there will be intruders that were never identified or anticipated in their plans.

As a corollary to the “if I see it–I can take it” is the second law of Gleason’s principles, “not if-it’s when”. Everyone who is online or has a presence on the internet will be hacked or breached at some point in time, no matter the precautions.


  • This may be a hard pill to swallow, often met with some skepticism and disbelief by executives and practitioners of the “Arts of IT security.” However, at this stage, I am talking to executives who are ignoring or misunderstanding that their operations are constantly being probed, monitored, and under some level of threat from unseen attackers. That is the point I want to drive home and lead them into the third rule of Gleason’s principles.


  • “Harden the target”! Make the company’s files and confidential data so hard to “pilfer and read” that the “bad guys” will, after a while, move on to softer targets. Hackers know that files yield the largest payout in the black market. One little Excel might be worth $100s or $1000s for that one file. Encrypting the files and important corporate data will render the files and data worthless if a thief gains access to the system. The spoils are useless to them for profit.

The reality is, we all live with the notion of “threat and theft” no matter what business we are in. And, we all know the headlines and stories and my sermon is; “if I see it–I can take it”, “not if-it’s when”, and to protect the assets “harden the target”, encrypt the data.


I have been in this industry for over thirty years, being involved with the evolution of Microsoft’s software and services, programming and architecting Cloud infrastructures and Data Centers across the US. As CTO of Active Cypher, I have been engaged with Microsoft’s evolution and transformation over these many years. We’ve created Active Cypher Cloud Fortress (ACCF) to be deeply integrated into Microsoft’s Active Directory and Microsoft’s Azure cloud. The solution is ACCF and it encrypts files using security permissions controlled by Active Directory which adheres to the company’s policies and permissions. It is a downloadable solution.


In the next edition of my principles, laws, and solution description, I will direct my discussions, not to the layman or generalist, but to the more seasoned IT professional. I am passionate about getting honest, no “baloney” info out to the person who is overwhelmed with buzz words, marketing hype, and spin. You can go to www.activecypher.com to learn more about Active Cypher Cloud Fortress. Until the next edition.


Get Started Today

Our products go straight to the heart of data protection and security with a cost-effective, sensible approach to safeguarding your company.

 

Let's assess where you are now and how quickly we can help you secure your data assets everywhere.

Schedule an Assessment

Thanks for submitting!

Active Cypher's company logo. An upside down triangle with geometric pattern in multiple shades of teal. The words "Active Cyper" are above the icon in white.

4299 MacArthur Blvd, Ste. 104

Newport Beach, CA 92660

T: 714-477-1045

Icon of Microsoft Silver Partner, with classic four colored Microsoft icon with words in white that say "Microsoft Silver Partner".
Icon for Microsoft Intelligent Security Association. In white, says "Member of Microsoft Intelligent Security Association" with smaller Microsoft logo and name below.

© 2015-2022, All rights reserved. Active Cypher™

bottom of page