Technology

Object Level Encryption (OLE)

Cyber Sphere’s technology is rooted in Object Level Encryption. In our applications, this encryption as well as the key management is fully automated and applies tailored protection to each file or group of files. Users define ad-hoc group or individual Access Control Lists (ACL) for each file or folder for flexible workgroup definition based on need-to-know and these files are protected even if network or server intrusion occurs. There are no file size limits. Objects are encrypted on the originating computer, not a central server or cloud. Encrypted objects can be safely stored and moved, even outside the network, and are only accessible by pre-authorized individuals. It also detects and reports unauthorized access attempts and can be scripted to trigger an automated response. There can be revocation based on ACL changes, time limit, etc.

Work Groups and Access Control Lists (ACLs)

Users can be organized into work groups.  Files sent within these groups can only be received and devaulted by users within that group. Universal users are members of all work groups within an organization, cross sector users belong to more than one work group but not all, and sector users belong to just one.

Object Level Firewall (OLFW)

Our encryption key management method and protocol can protect “data at rest” and “data in motion”. This technology was developed to meet the needs of U.S. Government data security applications. This system not only protects the data but can detect and react to attempted intrusions. Cyber Sphere’s products can be used in a wide range of government and commercial computer and network applications.

Robust Access Management

Managing access to encrypted data is a hassle without transformative technology. Deciding to use encryption techniques such as PKI certificates is expensive, labor-intensive, and overly complicated. With all of the hurdles preventing people from protecting their data, it makes it difficult to achieve security. With Cyber Sphere’s system, managing access is simple, transparent, and cost effective. Access to specific data can be based on user, device, location, time, and a variety of other parameters, giving the client complete control of their data. Better yet, data does not have to be re-encrypted every time its access settings are changed, saving time and resources.

Security

Cyber Sphere’s rFiler is designed and tested to meet the highest industry information security standards.  It is fully compliant with FIPS 140-3 standards; the encryption algorithms it utilizes meet FIPS 140-3 level 3 and 4 security requirements.

Additionally, rFiler has undergone rigorous white hat testing against a wide range of malicious attacks and cyber threats.  Testers were given the IP address of the endpoint and two days to break in and were unsuccessful trying many different strategies.

rFiler is built on Cyber Sphere’s Object Level Encryption (OLE™) technology, which is encryption algorithm agnostic.  We can incorporate other existing encryption algorithms if required, including quantum encryption.

Cyber Sphere can also test to specific industry standards such as HIPAA for patient heath and CMMC for aerospace and defense.


Object Level Encryption (OLE) System/ Encryption Key Management System

U.S. patent no. 9,485,229: Read more about this patent here.

Key Management Method Protecting an Object Level Database

U.S. patent no. 10,909,254: Read more about this patent here