Entries by mmstaff

Achieve Data Governance

Traditionally, every application has implemented data security its own way, with its own policies, settings, and algorithms. The result is too complex and costly for users and administrators. And auditors, too.
You want consistency. Consistency gives you data governance you can manage and control. And audit.

Cord3 to Exhibit at RSA Conference 2019

Booth #1953 – March 5 – 7, Moscone Center, San Francisco
Cord3 was selected by the Ontario Provincial Government to participate in its pavilion at the RSA Conference in San Francisco from March 5 – 7, 2019. The pavilion is booth #1953 in the South Hall of the Moscone Center.

Cord3 to Exhibit at Black Hat 2019

Innovation City – August 7 – 8, Mandalay Bay, Las Vegas
Cord3 will exhibit its cyber security solutions at Black Hat in Las Vegas from August 7 – 8, 2019. Cord3’s booth is located in Innovation City (booth #IC2001) in the Mandalay Bay Convention Center.

Cord3’s Encryption

Quantum computers are only projected to “completely break” public-key cryptography algorithms. Quantum computers are not projected to be able to compromise good symmetric cryptography algorithms, such as the Advanced Encryption Standard (AES) algorithm used by Cord3 and many other encryption technologies, provided strong encryption keys are used.

Cloud Encryption Security Broker

“Our value proposition is that we keep the responsibility for protecting data – and this includes management of cryptographic keys – in the hands of the owner,” Rankin explained. “For any enterprise users who choose not to trust their data to the cloud, we are a great option.” I agree with his assessment, and this will become a more powerful statement as the company expands its use-cases to additional local and cloud computing options.