https://store-images.s-microsoft.com/image/apps.36727.81bfb73e-77de-41ac-8d9a-6ff80f75617e.1b6bbe64-26c6-4cb4-90fb-c7074d7e999a.8cdd4d38-e522-45a5-b105-a9c419d5066e
ShardSecure_Azure
ShardSecure Inc.
ShardSecure_Azure
ShardSecure Inc.
ShardSecure_Azure
ShardSecure Inc.
ShardSecure desensitizes sensitive data for security, privacy & redundancy in your cloud environment
Our patent-pending Microshard(TM) technology desensitizes sensitive data for data security, privacy, compliance, and business continuity. ShardSecure virtual appliances are available as virtual machines for on-prem deployment.
The Microsharding Process
Shred
Unstructured and structured data are shredded into microshards - as small as four bytes - which are too small to contain sensitive data such as birth dates, identification numbers, etc.
Mix
Microshards are mixed across multiple Microshard containers. File names, extensions, metadata, and any other identifiable information is removed. A configurable amount of poison data may be added, as well, to further complicate unauthorized reassembly.
Distribute
The Microshard containers are distributed across multiple, user-owned storage locations with native support for multi-region and hybrid-cloud configurations. Each location contains an unintelligible 1/x fraction of the complete data set, where x is the number of storage locations allocated.
Microsharding for Data Integrity
The microsharding process includes multiple data integrity checks to help ensure data integrity. If an integrity disparity is detected, the affected Microshard data is restored to its last known good state. The cause of the disparity - unauthorized deletion or any form of tampering, including ransomware - is irrelevant. Any form of tampering with data at rest is an indicator of compromise and alerts will be generated via SMTP, via HTTP for consumption by SIEMs and/or SOARs, as well as Slack.
Microsharding for Data Availability
Should a storage location become unavailable for any reason, the Microshard data stored in the affected location will be recreated to support business continuity.
Popular Use Cases
Secure cloud migration
Secure cold storage migration from on-prem to cloud storage
Cloud storage ransomware