https://store-images.s-microsoft.com/image/apps.36727.81bfb73e-77de-41ac-8d9a-6ff80f75617e.1b6bbe64-26c6-4cb4-90fb-c7074d7e999a.8cdd4d38-e522-45a5-b105-a9c419d5066e

ShardSecure_Azure

ShardSecure Inc.

ShardSecure_Azure

ShardSecure Inc.

ShardSecure desensitizes sensitive data for security, privacy & redundancy in your cloud environment

Our patent-pending Microshard(TM) technology desensitizes sensitive data for data security, privacy, compliance, and business continuity. ShardSecure virtual appliances are available as virtual machines for on-prem deployment. The Microsharding Process Shred Unstructured and structured data are shredded into microshards - as small as four bytes - which are too small to contain sensitive data such as birth dates, identification numbers, etc. Mix Microshards are mixed across multiple Microshard containers. File names, extensions, metadata, and any other identifiable information is removed. A configurable amount of poison data may be added, as well, to further complicate unauthorized reassembly. Distribute The Microshard containers are distributed across multiple, user-owned storage locations with native support for multi-region and hybrid-cloud configurations. Each location contains an unintelligible 1/x fraction of the complete data set, where x is the number of storage locations allocated. Microsharding for Data Integrity The microsharding process includes multiple data integrity checks to help ensure data integrity. If an integrity disparity is detected, the affected Microshard data is restored to its last known good state. The cause of the disparity - unauthorized deletion or any form of tampering, including ransomware - is irrelevant. Any form of tampering with data at rest is an indicator of compromise and alerts will be generated via SMTP, via HTTP for consumption by SIEMs and/or SOARs, as well as Slack. Microsharding for Data Availability Should a storage location become unavailable for any reason, the Microshard data stored in the affected location will be recreated to support business continuity. Popular Use Cases Secure cloud migration Secure cold storage migration from on-prem to cloud storage Cloud storage ransomware