Data Guard

The ultimate solution to avoid insider mistakes and cyberthreats. Enterprise-level security that is both easy to use and affordable.

Active Cypher data guard
active cypher secure a chain of data custody Enterprise-level security
device based

Secure A Chain Of
Data Custody

Chain of data custody should be maintained to ensure admissibility and evidence integrity.

Clients utilizing Data Guard are able to fulfill chain of custody requirements with complete transparency and auditability of file activity. AI-powered sensors capture and log events such as who accessed a file, at what time, and whether a file was modified, downloaded and/or shared.

active cypher secure a chain of data custody Enterprise-level security

Make Your Files Invisible
To Ransomware

If they can see it, they will attack it. Block ransomware and other cyberthreats from locking your company data and personal file, demanding a hefty payment. Hide your files from ransomware and proactively fight threats at every stage of the attack chain to ensure that your files are always protected.

Average hourly cost of downtime*

Number of 2019 Breaches**

of organizations were attacked over the past 3 years*

Powerful. Automated. Trusted.

The ultimate solution to avoid insider mistakes and cyberthreats. Enterprise-level security that is both easy to use and affordable.

Why Data Guard?

Defend your intelectual property

Defend your Intellectual Property

Track and protect your files even after they are emailed. Maintain advanced control through Secure File Share:
• Control how files are used.
• Timestamp when file was opened.
• Log time spent on each page.
• Know location of every file via IP geolocation.

Limit duration of access

Limit Duration of Access

In many cases, data shouldn’t be shared forever.
• Limit how long a file remains viewable.
• Shared files can be recalled instantaneously.
• Access to shared files can be revoked at any time, whether in an inbox or opened on a web browser.

Increased protection and governance

Increased Protection and Governance

Create an auditable trace of who accessed your data with AI-powered sensors.
• Monitor suspicious activity.
• Maintain compliance with GDPR, CCPA, and other consumer protection laws.

active cypher

Safely Send Files

Turn any file into a PDF-like experience, allowing you to share uneditable, secured files. Guard your data wherever it goes. When collaboration is needed, edit with coworkers and clients in a secure environment.

active cypher

Industry-Level Compliance

Data Guard ensures compliance with multiple industry requirements. GDPR, CCPA, HIPAA, and more are covered the moment you download Data Guard.

active cypher

Real-Time Cloud Backup

Automatic and instantaneous recovery of all your protected files is only one-click away. Secure your data with cloud backups protected by quantum-resilient encryption. Reset your computer to before an attack. It’s like rewinding time.

One of the most infamous ransomware variants

As its name suggests, WannaCry’s unfortunate success has led to much grief. Starting in May 2017, WannaCry has infected over 300,000 computers in practically every country in the world by taking advantage of an unpatched Microsoft Windows vulnerability (MS17-010). While a patch was released, some estimate millions of computers remain vulnerable.

EternalBlue, an exploit that was allegedly developed by the United States National Security Agency (NSA), was released publically by a group of hackers called the Shadow Brokers. EternalBlue allowed WannaCry to spread rapidly, with DoublePulsar being the ‘backdoor’ installed on the infected computers.

The $2 billion ransomware

Discovered at the end of 2018, GandCrab is part of Ransomware-as-a-Service (RaaS) deployment and has quickly become a very commonly seen ransomware threat. GandCrab is the first ransomware to demand payment in DASH cryptocurrency and while utilizing the “. bit” top-level domain (TLD). This TLD is not sanctioned by ICANN and it, therefore, provides an extra level of secrecy to the attackers. GandCrab uses AES-256, RC4, and RSA-2048 encryption for encrypting AES keys, the victim’s data, and Network traffic data respectively.

Perhaps with a sick level of obnoxiousness, the developers of GandCrab boasted that they were shutting down their operations in January 2019 and retiring after their ransomware made $2 billion in total, netting them $150 million personally. The crooks behind GandCrab actively updated their RaaS, keeping up with new security patches. Will GandCrab ever come out of retirement?

State-sponsored ransomware?

Sodinokibi is allegedly distributed by attackers affiliated with those that distributed the infamous GandCrab ransomware. Perhaps hinting at a level of state-sponsorship, Sodinokibi avoids infecting computers from Iran, Russia, and other countries that were formerly part of the USSR. The ransomware uses an Elliptic Curve Integrated Encryption Scheme (ECIES) for key generation and exchange (Elliptic-curve Diffie-Hellman key exchange algorithm).

Sodinokibi uses AES and Salsa20 algorithms to encrypt session keys and user’s files respectively. AES is also used to encrypt network data that is sent to the control server. The ransomware typically demands from the victim around 0.32806964 BTC (≈ $2,500) to regain access to the encrypted files.

No charity with this RobbinHood

Despite its name, RobbinHood ransomware is not stealing from the rich to give to the poor. Instead, the malicious code, which is gaining popularity in the black hat worlds, targets enterprise and critical government infrastructure, feeding ransom to itself. In 2019 alone, RobbinHood successfully attacked and received ransom payouts from the cities of Baltimore, Maryland, and Greenville, North Carolina.

RobbinHood’s ransom isn’t at all cheap. Demands from the malicious actors can range from 3 Bitcoin for a single computer and up to 13 Bitcoin for an organization’s network, which translates to tens of thousands of dollars. Some cities have reportedly paid millions.

Learn More About Data Guard

Schedule a call to consult with our cybersecurity specialists.