ZenithSecure said on Tuesday that it has launched the world's most secure database solution, the ZenithVault. It leverages automated secret sharing techniques, making it practically impossible for hackers to gain access and steal sensitive data like credit card numbers, financial documents, patents, and even government secrets.
ZenithSecure explains that data is typically secured by applying a set of security layers over a centralized SQL database system. Over the years this system has allowed hackers to master gaining access, as security layers can usually be circumvented, no matter how many are used. ZenithSecure's solution takes a different approach by using automatic data-splitting.
According to the company, ZenithVault first encrypts data with the user’s defined password as the encryption key. The automatic data-splitting then kicks in at the bit level, and the split data is slung across multiple servers located in multiple regions using SSL or Diffie-Hellman/Elliptic curve transport encryption -- the type is determined by the ZenithVault version currently in use. Here's what the ZenithVault Enterprise administrative console looks like:
"Each storage server is running a different operating system," the company said. "The use of different OSes per server defends against zero day attacks and/or OS exploits. This exclusive secret-sharing technique creates the most secure database available today. No longer does a single server breach mean compromised data. ZenithVault represents the most secured database against external or internal hacking attempts."
If a hacker breaks into a server running ZenithVault, they will only have access to random meaningless and garbled bits of partially encrypted data. To be able to view the entire encrypted secret, the hacker would need to simultaneously breach at least three geographically distant servers with each running different operating systems and application environments.
"Another security feature is that the ZenithVault servers only send out data bits associated with the appropriate user password," the company said. "These passwords are also subject to data splitting and encryption. ZenithVault is limitless in scalability. The more servers you add to the cluster, the higher the security and storage capacity it achieves, without affecting performance."
Mihai Motocu, CTO of ZenithSecure, said the inspiration behind ZenithValut came from the method employed by the United States government in securing its nuclear missile launch codes. The company's new solution can be implemented within an existing application in parallel with its database, and can be easily integrated using programming language. It can even be deployed within a single day.
Currently there are three version of ZenithVault: the freeware version which can be downloaded here, Enterprise and SaaS (Software as a Service). ZenithVault Enterprise and ZenithVault SaaS pricing models are structured according to specific client requirements and their configuration needs, the company said.
Kevin Parrish is a contributing editor and writer for Tom's Hardware,Tom's Games and Tom's Guide. He's also a graphic artist, CAD operator and network administrator.
See here for all of Kevin's Tom's IT Pro articles.