Presentation is loading. Please wait.

Presentation is loading. Please wait.

MicroToken Exchange Data Security Solutions

Similar presentations


Presentation on theme: "MicroToken Exchange Data Security Solutions"— Presentation transcript:

1 MicroToken Exchange Data Security Solutions
MicroToken Exchange Data Security Solutions DATA-IN-TRANSIT Web Application WebMTE We don’t make the things you use We make the things you use more secure August 2019 © Copyright Eclypses Confidential

2 Securing Transmitted Data
Most networks being used are simply not safe nor secure. Transmitted data remains vulnerable to attack! In most encrypted applications, the underlying transport type is TCP. TCP must be resilient to protect applications from attacks “95% of HTTPS servers are vulnerable to Man in The Middle (MitM) attacks.” 1/3+ of exploitation involved MitM attacks.” Public Wi-Fi – Mobile ~ Corporate ~ Personal ~ Home ~ IBM’s X-Force Threat Intelligence Index 2018.

3 Problems We Help To Solve - Securing Transmitted Data
Data-In-Transit In a perfect world, what internet security would you want for your firm and for your clients? What would client’s think if you Could offer levels of Security your competitors did not possess?

4 Securing Data In Transit - MTE for Web Applications
Eclypses MicroToken Exchange (MTE) Scalable to well over 1000’s of simultaneous connections Can be utilized within all major browser types that support it Every sensitive data transmission secured Automated within Javas script Functions within Web Assembly framework WebMTE is the first protection of its kind as it secures transmitted sensitive data elements within a web page both seamlessly and easily Point to point technology

5 Securing Data In Transit - WebMTE
Data-At-Rest Protects the data that will be transmitted over unsecured Wi-Fi, as well as, many other network connection types Connected Devices Each instance of sensitive data can be locked down individually before transmission Eliminates plausible “Man-In-The-Middle” attacks No Key Management required nor managed by Endpoints Data-In-Transit No effect upon “User” experience, including latency No additional action required by user to enable the MTE Technology No software installed onto user endpoints Agnostic to communication protocols Simple implementation Scales with minimal effort

6 Securing Data In Transit - MTE for Web Applications
WebMTE Secures Transmissions of Sensitive Data to and from Web Servers Payments ~ eCommerce ~ All Payments and PII elements Forms – Applications, Healthcare, Claims Registration, Credentialing, Verification PII – All types of Personal Identifiable Information Secure Structured or Unstructured forms of data Patent Pending key management

7 The technology behind MTE for Web Applications
Secure Data Transmission Between Endpoints Pll Data Transactions, Verifications, Mobile & Desktop Applications Live Feed – Streaming Video – Surveillance Any File Type – e.g. , Documents

8 Securing Data In Transit - MTE for Web Applications
A web browser requests a webpage from a web server The web server sends client-side logic to the browser which will also contain the MTE Commander WebAssembly

9 Securing Data In Transit - MTE for Web Applications
Web browser displays a form for the entry of sensitive information The user enters the information to be transmitted securely. Name: Your name Here SSN: Name: 3KXyQ6KNoG SSN: 6I<'nsh`9^M~>}/_ Utilizing JavaScript, the webpage calls upon MTE’s Commander to securely MicroTokenize the sensitive data.

10 Penetration Tested To NIST 800-30
Penetration Testing Excerpts from H2L Solutions, Inc. - Executive Summary “With the current techniques and safeguards in place, as well as the algorithms being used in MTE Authentication Token generation, it would take the attempt of a nation-state level actor to break the process being used to both generate tokens and decrypt, or read those tokens, as communication between client and server”. “This technology provides possibilities to extend current and future military technologies by allowing the implementation of remote functionality without compromising security and safety of both the warfighters and equipment”.

11 Securing Data via MicroToken Exchange
Contact Us Ensuring that sensitive data remains unavailable to exploitation in the event of an internal or external network defense breach For more information contact: Direct: (USA) Securing Data via MicroToken Exchange Thank You For Your Interest Thank You For Your Interest Thank You For Your Interest


Download ppt "MicroToken Exchange Data Security Solutions"

Similar presentations


Ads by Google