Author name: Ciphertex Admin

Ciphertex: Who Are We?

Ciphertex Data Security® is trusted around the globe to provide solutions for data encryption, storage, and transportation. Our products and services are used by military organizations, government agencies, industry leaders, businesses, and personal users. With advanced AES 256-bit encryption technology, these devices are powerful enough to keep even your most sensitive data secure. How do […]

Ciphertex: Who Are We? Read More »

Data Encryption

In a substitution cipher, single letters, pairs of letters, or groups of three letters (or any combination of these) are changed, but the order of the letters stays the same. Simple substitution ciphers use single letters, whereas polygraphic ciphers use larger groups of letters. In plain terms, letters are substituted for other letters. In the

Data Encryption Read More »

Which Industries Need Reliable Data Security?

With more data being captured and stored than ever before, many industries are adopting data-driven technologies and solutions to improve their workflows and gain new insights. However, these capabilities have come at a cost: Since much of this data is sensitive, industries are forced to adopt reliable data security measures to protect both themselves and

Which Industries Need Reliable Data Security? Read More »

Cybersecurity Accountability Spread Thin In The C-suite

Cybersecurity Accountability Spread Thin In The C-suite While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go. A spate of recent surveys offer indications that the philosophy that “cybersecurity is everyone’s responsibility” is gaining steam in the C-suite at most large organizations. But digging into the numbers —

Cybersecurity Accountability Spread Thin In The C-suite Read More »

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!!

You can put away that sledgehammer now!!! National Institute of Standards and Technology (NIST) SP 800-88 Rev 1 conformity for data sanitation is offered within the Ciphertex SecureNAS® product line. There are three levels of data sanitation defined by the 800-88 standard, Destroy, Clear and Purge. Destroy (aka The Sledgehammer) is exactly what its name

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!! Read More »

Desjardins, Canada’s largest credit union, announces security breach

Today, Desjardins, Canada’s largest credit union and one of the world’s biggest banks, announced a security breach caused by a former employee. In a statement posted on its website, the bank said a bank employee had taken the data of 2.9 million members (2.7 million home users and 173,000 businesses and associated contacts) from its

Desjardins, Canada’s largest credit union, announces security breach Read More »

Study reveals that the majority of people stull share files and sensitive data via Email, the most vulnerable way to go!!!

A newly released study published by a well known security software source reveals that a stunning 75% of their survey participants use email to share files containing sensitive data, despite the fact that it is the least protected, least secure and most vulnerable way to do so. Data listed by participants included company intellectual property,

Study reveals that the majority of people stull share files and sensitive data via Email, the most vulnerable way to go!!! Read More »

Suprise! Time and again studies by ESG confirm that on-premise storage delivers a lower 5 year TCO than public clouds.

Extensive studies performed by Enterprise Strategy Group (ESG) as contracted by many companies, both cloud based and hardware vendors, have revealed what many consider to be a surprising outcome. The 5 year total cost of ownership (TCO) is less for installing on premise storage hardware than when contracting for public cloud facilities. These studies take

Suprise! Time and again studies by ESG confirm that on-premise storage delivers a lower 5 year TCO than public clouds. Read More »

Scroll to Top