What does Cord3 do?
Cord3 solves the most difficult challenge in data security – protecting data from administrator accounts with high privilege! Read this brief intro for a quick understanding.
Cord3 solves the most difficult challenge in data security – protecting data from administrator accounts with high privilege! Read this brief intro for a quick understanding.
Every organization faces the threat of administrators (and hackers with administrator credentials) using their high privilege accounts to access sensitive data.
This is especially risky when outsourcing to MSSPs that have full system and data access as privileged administrators. Because of their access to privileged administrator accounts for many customers, MSSPs have become the most targeted entities for cybersecurity attacks.
Cord3 protects data from MSSPs and other privileged administrators, so organizations no longer have to trust MSSPs or their internal IT and application administrators with access to sensitive data.
Cord3 transparently encrypts data using keys inaccessible to administrators, users, and applications, and then checks every time to see whether or not the user is authorized to access data – a “zero-trust for data” approach.
With Cord3, administrator system access no longer equals data access, greatly reducing the risk of using MSSPs. Learn more!
A recent Forbes article states – “The bottom line is that investing in securing perimeters leaves the most popular attack vector of all unprotected, which are privileged credentials.” We could not agree more.Some of the solutions proposed in the article, however, do not prevent privileged credential attacks – they just detect attacks, maybe, once they have occurred.
Numerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla.
LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create and send new emails, as well as to block emails so that intended recipients do not receive them. Researchers who discovered LightNeuron believe that this malware has been in use since 2014!
Cord3’s UNITY Email solution protects emails with encryption before they reach the Exchange server, so even a LightNeuron-compromised server cannot read emails protected by Cord3.
While LightNeuron is one specific attack vector, Cord3’s general approach prevents all sorts of attacks on email servers from accessing sensitive emails, including attacks using privileged administrator credentials.
Cord3’s solutions separate data security away from users, applications, and servers. It is this approach that mitigates traditional attack vectors, newly discovered attacks like LightNeuron, and even new attacks to come in the future. If Turla has determined techniques to install malware on Exchange servers, it is reasonable to believe others will follow in their footsteps and generate similar attacks.
Email is an entrenched business tool. Organizations cannot just turn off email. The best solution against LightNeuron and other backdoor attacks is to protect sensitive emails before they reach the Exchange server with software that is easy to deploy and easy to use – Cord3’s UNITY Email solution is exactly that solution!
One thing that does not improve when moving to the Cloud (or outsourcing to any MSP) is privileged credential abuse. In fact, when you use the Cloud, the opportunity for privileged credential attacks expands substantially beyond what is available to attackers in the Enterprise – which is bad enough.
Are your IT people spending more time than you would like on security audits and administration? If your answer is yes, then you are certainly not alone.
We’ve got your data covered … For encrypting data at rest, Cord3 only uses symmetric cryptography. Cord3 uses the Advanced Encryption Standard (AES) algorithm with 256-bit keys. We’ve got your data covered against future advances in quantum computing that are projected to “completely break” widely used algorithms like RSA and ECC.
Cord3 implements its data-centric security in Intercepts. These Intercepts get overlaid onto a network between users and application servers. By “overlaid”, we mean that there are minimal changes required to get Intercepts to work because they simply get connected to a network and immediately begin capturing data asset packets flowing over a network between end points. When a data asset (e.g., a file or an email) is fully re-built on an Intercept, the Intercept applies the organization’s security policy to that data asset before delivering the now-secured data to its destination.
Intercepts capture data asset packets flowing over a network and re-build the original data asset (e.g., a file or an email). When a data asset is fully re-built on an Intercept, the Intercept applies the organization’s security policy to that data asset, whether that is to protect an asset going to a server or make an access decision about data on a server.
“It’s your worst nightmare, and a cyber attacker’s dream come true: the credentials of a privileged user getting stolen or otherwise compromised. After all, privileged users can go practically anywhere and do anything in your network as they go about the business of configuring servers and systems and setting security policies.” CSO Online, January 2018
900 Morrison Drive Suite 202
Ottawa, Canada
info@cord3inc.com
+1 343 488 8720
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OKLearn moreWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refuseing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them:
You can read about our cookies and privacy settings in detail on our Privacy Policy Page.
Privacy Policy