+1 (415) 529-5225
info@definisec.com

Crypto Challenge

Making Sure You Benefit

On November 13th, we announced our Crypto Challenge, offering $100 in food delivery value (via electronic gift card) in exchange for your time to download and quickly evaluate SSProtect using guidance offered in our online Knowledge Base

Since then, we reduced our original target scope while also offering a 2x reward multiplier for those who choose to continue with Admin/ Sharing considerations.

The time commitment is anywhere from 20-30 minutes for the original reward, with about the same amount of time-effort to extend for the 2x mulitplier.

We’ve chosen this approach to make certain you get something for your time. In an industry replete with false claims, overstatements, and misleading promotion, we understand it’s challenging to know where and when to try something new.

To help you understand, we’ve provided some additional insight into what you can expect to experience when you download and use our SSProtect software.

What You Will Discover Using SSProtect

Worst case, you get free lunch (and then some), but more importantly, what if SSProtect does what you need it to do?

Here are some things you can expect – and if we’re wrong, or in any way misleading, tell us – it’s critically important that we set proper expectation and deliver. We don’t ever want to be perceived as stretching the truth or making up convenient stories to peddle snake oil.

Our Truth: KODiAC Cloud Services really can’t access your data.

This isn’t a logical construct and it doesn’t result from procedural controls: This is by design and an inherent part of the very core of our system. It’s also a critical aspect of our patents, so you can drill down to see exactly how it works – and verify that the theory is sound.

99.9% of the time, when you hear this, it’s a twist on reality. Though our host software absolutely accesses your plaintext content, it converts this to ciphertext and never shares plaintext with KODiAC Cloud Services – by design. There are two other players, who do very different things, that actually do this right. We haven’t found anyone else that does, despite all claims to the contrary.

That means cloud data management relies on the, “good nature” of privileged operators, and/ or extensive oversight and controls. That’s not wholly wrong or bad, but an attacker that steals that person’s credentials – different story.

That wasn’t good enough for us, and from day one, our patented cryptographic offloading aimed to solve this – and related – problems.

Our Truth: Our host workflow integration really is application-independent.

When you access a file you’ve encrypted/ protected with our software, we engage a set of operations too complex to explain with clarity, even if we throw away the idea of putting it in simple terms and decide we don’t have to be concise. But ultimately, we do this without any knowledge of the software you’re using to edit/ review/ modify protected content.

Our Truth: Yes, we really do isolate document plaintext while you edit it in native software.

As an extension to the previous comment, we are in fact able to apply protective isolation to the plaintext that results when we execute our offloaded method for converting content to/ from ciphertext/ plaintext. This is akin to saying that we have E2EE for end-user data on the desktop when it’s protected/ managed by SSProtect (for lack of a better way to put it in a sentence).

Our Truth: Performance has consistently been one of the first surprises our users share with us.

We get the, “especially given how you’re going about it” kind of claims from those who have technical insight into what we do and the experience to recognize related challenges. We spent a good 18 months working optimizations and building entire subsystems from scratch to set aside, “common” technologies, frameworks, and the resulting tunnel vision to make certain we built specialized optimizations that deliver practical results across the board. Performance was – and remains – that one piece separating those who might slap something together then take a few shortcuts and demo a, “competitive offering” and those that are able to bring similar capabilities to market.

Our Truth: Others have tried, failed, and admitted it to us – more than a couple times.

In the course of approaching partners, technologists, innovators, and even competitors, we’ve had more than a couple teams tell us how much money and time they spent attempting to solve pieces of the overall problem we’re addressing in an integrated system. The value you gain from SSProtect isn’t just the ability derived from this or that, it’s also and largely the fact that we combine numerous, “firsts” together with the very specific goal of, “reducing breach impact” which is a broad and extensive problem.

Our Truth: We’re not boiling the ocean, services target common secure data mgmt tasks.

If we start with the core services offered by SSProtect then walk through each of the optional services, those with experience across the board may start to see how each piece both addresses aspects of the more broad problem while also offering, “baseline” oportunities to do other, higher-level things that are also unique. We have had peopel tell us we’re boiling the ocean, and we’d counter that, when we walk through all the daily activities surrounding data protecton and related CyberSecurity dynamics, we’re hearing from someone who hasn’t yet experienced enough of that equation to recognize that every single service component serves a priority purpose on the minds of those handling daily operations.

Our Truth: We do not engage in consulting, integration, or service work.

DefiniSec doesn’t provide Non-Recurring Engineering services. Though this may be unusual for our dynamic and to some, may seem self-limiting but we’re a product and technology company and do not, have not, and will not engage in integration services or specialized development. In fact, SSProtect was designed for quick, easy deployment – one of the major differentiators.

Our Truth: You really can deploy and protect in minutes, hours, days depending on target scope.

Our self-service deployment foundation is disconcerting to some – it’s not limited, it’s empowering for those that don’t have extensive infrastructure to protect or leverage. Though one can automate a self-service capability’s deployment, one likely can’t turn an Enterprise construct into a self-service construct without significant effort. Therein lies the justification for the approach we’ve taken.

The Sky is the Limit

There are many more things we can do, and we invite you to conisder the Crypto Challenge as a means for making certain you benefit from a little bit of time spent looking at what we have. We’re confident that we have meaningful and efficient capabilities you won’t find anywhere else. Question is, are they right for you?

What have you got to lose?