Data Protection & encryption

View Fact SheetsGet a Quote

Data protection and encryption

Data protection and encryption is used to protect information in transit and at rest. The primary function of data encryption is keeping information out of the hands of those who should not be granted access to sensitive information.

Security VS privacy

The principles of data protection

Organisations are subject to data protection and data security legislation. For the purposes of global compliance with data protection and security laws, experts recommend organisations implement policies for effective data governance. Sensitive data must be closely guarded, sensitive information such as personally identifiable information (i.e. social security numbers, names, etc) should be kept well-encrypted.

i

Data Availability

Data availability ensures that those who need access to certain data should be able to use it regardless of if the data is damaged or lost.

 

n

Cryptanalysis

Data Management has two key areas when it comes to the protection of data. These are: Lifecycle Management and Information Lifecycle Management.

 

 Data encryption challenges

Brute Force

Data encryption uses symmetric and asymmetric keys. Only the correct key can decrypt the data. Brute Force is the process of attackers trying multiple random keys in an attempt to find the correct key.

/

Side-Channel Attacks

A side-channel attack goes after the implementation of a cipher instead of a cipher itself. This probes weaknesses in system design.

 

Controlling Keys

Key Management and adequate key security, including the protection of key rotation and key confinement policies (i.e. never allowing key swaps).

 

Cryptanalysis

Cryptanalysis attacks will exploit potential weaknesses within a cipher. These can include man-in-the-middle attacks along with other methods.

 

Data Encryption for 

Databases
Files and file system
Storage units
Directories
Applications

 

Key Management
and Protection

We parter with/resell Gemalto/Safenet products

These security products provide protection and encryption of data in transit and at rest
and are ideal for implementation in physical, virtual or cloud environments.

Encryption services

We cover both encrypting the data and the path, protecting keys, BYOK, BYOE, HYOK and Tokenisation.

N

Data Level Encryption

N

Session Level Encryption

Fact Sheets

What is Encryption?

Protecting Your Keys

Tokenisation

Australia

1800 COGITO (264486)

or +61 2 6140 4494

New Zealand

0800 COGITO (264486)

or +64 4909 7580

Support Services:

Primary: +64 22 694 2169

Secondary: +64 27 566 3355

[email protected]

Auckland | Brisbane | Canberra | London | Melbourne | Sydney | Washington DC| Wellington 

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you

Please enter your details to unlock this content

Please enter your details to unlock this content

Access will be granted after your email address is confirmed

Thank you