Resources

Home / Resources / Page 2

LightNeuron malware – Cord3’s Solution!

Numerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla. LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create

Read More »

Cord3’s Encryption

Strong Today … Strong for the Future To protect sensitive data at rest, Cord3 uses extremely strong, standards-compliant cryptography. There are two classes of cryptography: For encrypting data at rest, Cord3 only uses symmetric cryptography. Most technologies combine public-key cryptography together with symmetric cryptography to make key management easier for users

Read More »

How Strong are 256-bit Symmetric Keys?

Unimaginably Strong For encrypting data at rest, Cord3 onlyuses symmetric cryptographywith a unique 256-bit key for every data asset. Cord3 uses a FIPS 140-2 approved implementation of the Advanced Encryption Standard (AES) algorithm. Since there is nothing secret about the AES algorithm itself, the security comes from the keys being

Read More »

About Cord3

Cord3 DCS strongly protects files, chat rooms, emails, and more by encrypting them at rest and controlling access to protected data. Our technology delivers consistent, policy-driven data security for cloud and enterprise data that protects against access by unauthorized privileged administrators. Unlike other data security approaches, Cord3’s solutions work completely transparently to users and do not require any changes to existing applications.

DCS Whitepaper

How Does a Data-Centric Security Overlay Impact Your Organization?

A data-centric solution can achieves the goals of data encryption and access control without requiring changes to applications on end-user devices or servers.

Download the whitepaper to see how these benefits can elevate your organization.