The REST API model implemented in our product stack gives your data unprecedented protection in a very straightforward method. Simply point the product config to some of your storage and start calling our API's.
White label true security for your apps with our fully managed, complete, data protection platform for your apps
nTropic Security Inc. was founded to proactively and intelligently provide the deepest and most advanced levels of protection to files, crown jewel digital assets, data at rest, and data in transit. Through it's flagship product, KDisperse™, this objective has been reached. KDisperse™ implements a secure perimeter-less enterprise by introducing a modern, innovative, and disruptive approach to data protection and information privacy.
KDisperse™ works by heavily, and randomly, obfuscating and dispersing a data set that is to be protected. The integral parts of the overall process (embodied in a patent pending algorithm) are entropy based and have as a core principle that of leaving no pattern whereupon an attacker can effectively reconstruct the original data set (even in the face of a storage breach). Disparate customer owned storage locations, preferably in the form of a hybrid (on-premise and cloud) ecosystem, are leveraged to disperse the obfuscated shards further mitigating the likelihood of data leakage when an entity is protected by KDisperse™. During the reconstruction process entropy is also used as the obfuscation layers are reversed such that an authorized entity has total access to the original data set.
The use of Entropy (both as deception technology and as an anti-pattern mechanism) is at the heart of KDisperse™
The use of disinformation is a core tenet of KDisperse™. This deception technology technique imposes on attackers the added challenge of trying to decipher what data (at the lowest levels) is real and what is not
Obfuscation, via Entropy based encryption, is a very powerful technique employed by KDisperse™ truly raising an attackers work factor to unprecedented levels
KDisperse™ aims to seamlessly provide your data with a strong security posture while not increasing the complexity necessary in order to achieve that goal
How it's done:
1. Setup storage
2. Deploy and configure KDisperse™
3. Use the solution
KDisperse™ uses your storage. Share a number of endpoints as mountable via SMB/CIFS or NFS. The more endpoints we use the stronger the security as it amplifies one of the deception technologies introduced
Deploy and configure KDisperse™
Start using KDisperse™ via the REST API’s exposed to you
© 2019 nTropic Security, Inc.