Microsharding: Defense in Depth for Data

ISACA + ShardSecure, Microsharding: Defense in Depth for Data

Despite stacking numerous security controls, one wrong click can result in a major cloud data breach. For decades the last line of defense for securing data at rest has been encryption, yet its implementation on cloud infrastructure has resulted in unprecedented levels of data exposure.

With Microshard™ Technology, we have the first ever opportunity to apply defense in depth to data at rest, at the data level, in the cloud.

451 Research: Data Obfuscation on the Rise

In a new report, Data obfuscation rises in importance due to the growing desire for self-service data, 451 Research concludes that the need to integrate techniques such as data masking into self-service data operations will rise as organizations look to accelerate their DevOps and developers’ access to production data. The study finds that more organizations are aiming to implement data obfuscation methods, including ShardSecure’s Microshard™ technology, to protect their data.

Whitepaper: Microsharding

Authored by ShardSecure’s Jesper Tohmo, CTO and Co-founder and Christer Roslund, VP Engineering and Co-founder, as well as Robert A. Clyde, ISACA Board Member and ShardSecure Senior Advisor, this whitepaper details how a new technology, Microsharding, has emerged as a leading data security and privacy solution.

Microshard Secure Implementation & Audit Guide

This document is designed to aid security implementers to securely plan a Microshard deployment, as well as auditors in assessing risk and compliance with data secured by Microshard technology. There are unique concepts and considerations when auditing Microsharded data, and careful considerations to take into account when deploying Microshard Technology in your environment. As with all security tools, the details matter.

Beat the cloud data breach with Microshard technology

Get an inside look at the most prevalent ways organizations are being breached in the cloud, and how you can mitigate those risks with Microsharding. Dr. Ed Amoroso, TAG Cyber and our CEO and Co-founder Bob Lam, join cybersecurity experts from the ShardSecure team to outline how you can ensure total data privacy for your organization beyond encryption.

ShardSecure™ Datasheet

ShardSecure’s Microshard™ technology shreds, mixes and distributes data to eliminate the value of data on backend infrastructure, ensuring data is protected in the event of a breach, separated from those with privileged access and that the sensitivity class is reduced.

2021 TAG Cyber Security Annual Report

The 2021 Security Annual is part of an annual series from TAG Cyber that is published each September since 2016. The report offers expert guidance, analysis, and education across the entire cyber security ecosystem.

Data security in cloud computing requires Microsharding™ to augment encryption

ShardSecure’s CEO, Bob Lam, joined TAG Cyber’s Ed Amoroso, to discuss how microsharding data will augment encryption in the near term and potentially replace the need for encryption altogether.

Sensitive data demands better data security controls than just encryption

ShardSecure’s VP Strategic Sales, Robert Stephen, joined TAG Cyber’s Senior Analyst, Katie Teitler to discuss the need for businesses and organizations to remain operational with staff working from anywhere.

Data Sharding for Back-End Cloud Security

Data sharding for back-end cloud security addresses the threat of compromised insiders with privileged access. The Method disaggregates, separates, and obfuscates data so that insiders within cloud service infrastructure cannot make sense of stored assets.

451 Research

The emerging data security provider was founded on a fairly simple premise: Split sensitive data into tiny pieces and distribute them across multiple locations so that the individual pieces are meaningless in the wrong hands, a process known as ‘sharding.

ShardSecure Interview with the Global Cyber Center

Splitting sensitive data into dispersed “microshards” can help reduce data sensitivity while lowering compliance costs and accelerating cloud adoption. ShardSecure CEO Bob Lam appears in Episode #4: Cyber Insights by SOSA.

ShardSecure™ Wins AWS “Judges Favorite Startup” Award

ShardSecure CEO, Bob Lam, presents the company’s unique Microshard technology to a panel of industry experts at the AWS event. As cloud adoption soars amid overwhelming global demand for work-from-home compatibility, we are proud to be voted “Judges Favorite Startup” at the AWS Winning Pitch Deck event last October.

UHY Opinion Letter

Our world is in a constant state of change. Our society has become a canvas of digital points of business data and personal information. In this new era of personal and professional interaction privacy has become next to impossible.

Microshard™ Technical White Paper

Fragmenting data into tiny elements which are spatially dispersed and intermixed with other fragments (Microshard data) has numerous advantages in security and compliance.