451 Research: Data Obfuscation on the Rise

In a new report, Data obfuscation rises in importance due to the growing desire for self-service data, 451 Research concludes that the need to integrate techniques such as data masking into self-service data operations will rise as organizations look to accelerate their DevOps and developers’ access to production data. The study finds that more organizations are aiming to implement data obfuscation methods, including ShardSecure’s Microshard™ technology, to protect their data.

Whitepaper: Microsharding

Authored by ShardSecure’s Jesper Tohmo, CTO and Co-founder and Christer Roslund, VP Engineering and Co-founder, as well as Robert A. Clyde, ISACA Board Member and ShardSecure Senior Advisor, this whitepaper details how a new technology, Microsharding, has emerged as a leading data security and privacy solution.

Microshard Secure Implementation & Audit Guide

This document is designed to aid security implementers to securely plan a Microshard deployment, as well as auditors in assessing risk and compliance with data secured by Microshard technology. There are unique concepts and considerations when auditing Microsharded data, and careful considerations to take into account when deploying Microshard Technology in your environment. As with all security tools, the details matter.

ShardSecure™ Datasheet

ShardSecure’s Microshard™ technology shreds, mixes and distributes data to eliminate the value of data on backend infrastructure, ensuring data is protected in the event of a breach, separated from those with privileged access and that the sensitivity class is reduced.

2021 TAG Cyber Security Annual Report

The 2021 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The report offers expert guidance, analysis, and education across the entire cyber security ecosystem.

Data Sharding for Back-End Cloud Security

Data sharding for back-end cloud security addresses the threat of compromised insiders with privileged access. The Method disaggregates, separates, and obfuscates data so that insiders within cloud service infrastructure cannot make sense of stored assets.

451 Research

The emerging data security provider was founded on a fairly simple premise: Split sensitive data into tiny pieces and distribute them across multiple locations so that the individual pieces are meaningless in the wrong hands, a process known as ‘sharding.

UHY Opinion Letter

Our world is in a constant state of change. Our society has become a canvas of digital points of business data and personal information. In this new era of personal and professional interaction privacy has become next to impossible.

Microshard™ Technical White Paper

Fragmenting data into tiny elements which are spatially dispersed and intermixed with other fragments (Microshard data) has numerous advantages in security and compliance.