What do you get when you protect the industry's best search platform with the industry's most advanced data protection solution?
You get solutions for the most urgent security needs of the day i.e. ransomware and extortion defence
Try Spectra for Opensearch
Titaniam partners with OpenSearch to produce the industry’s first ransomware resistant analytic vault: Titaniam Spectra
Titaniam, maker of the industry’s most advanced data protection solutions, has partnered with Amazon OpenSearch, the industry’s best open source enterprise search platform, to address two of the hardest questions facing both governments as well as commercial enterprises today: First, how to build ransomware resistant applications and infrastructure from the ground up; and second, how to protect existing and legacy applications from the ever growing threat of ransomware and data related extortion.
In the event of successful ransomware attacks on Titaniam Spectra, enterprises would need to follow a simple two-step process:
- Restore Titaniam Spectra from its integrated backup
- Ignore ransom demands for exfiltrated data as it would retain encryption
Here is how we make this possible:
Meet Titaniam Spectra. Built on top of Amazon’s OpenSearch platform, Titaniam Spectra is the industry’s first and only ransomware proof analytic vault, featuring always-on data-in-use encryption and capable of supporting the entire data lifecycle including the indexing, querying, search, manipulation and transaction of valuable data without the use of clear text anywhere in the system. Not in the index. Not in memory. Nowhere.
With its ability to conduct full featured search and analytics on encrypted data, and configuration options to release data in over ten different secure and privacy preserving formats, Titaniam Spectra is the answer that enterprises and governments have been looking for to tackle the growing ransomware and data extortion menace.
- All strongly encrypted documents inside Titaniam Spectra’s primary relational datastore are enabled for full featured encrypted search using a secondary OpenSearch index.
- Powered by Titaniam’s adaptive data protection engine, OpenSearch operates on FIPS certified encrypted data while still retaining native full-featured search and analytics.
- If attacked and exfiltrated, Titaniam spectra data retains its encryption regardless of access credentials or user privileges.
- Once configured, no user, including the OpenSearch admin, can dump clear text data from the Spectra vault.
- For the above reasons, applications that utilize Titaniam Spectra in their back end architecture, are automatically privacy compliant, breach proof and resistant to data extortion.
- To complete the ransomware defense requirements, Titaniam Spectra can be configured for tamper free backup and recovery using a number of popular backup solutions.
Once the set-up is complete, enterprises can be assured that their valuable data is well protected from breach, ransomware and extortion.
In addition to the features listed above, Titaniam Spectra includes the following powerful security features that makes it stand apart from other data protection platforms:
- Pre-built downstream integrations: Titaniam Spectra comes pre-integrated with Titaniam Panther (API service), Titaniam Ripple (Proxy/Driver) and Titaniam Arcus (plug-in) so that organizations can extend the protection provided by Spectra to data even after it leaves the vault and flows through downstream applications. Data can be released in protected form and if required, decrypted much further downstream in a controlled and rate limited manner. Panther, Ripple and Arcus can facilitate the use of protected data downstream while retaining the encryption. This enables additional use cases without the risk of exposure.
- BYOK, valet and index level keys: Titaniam Spectra uses field level keys for all encryption. In addition, if you are a SaaS application, you can utilize our BYOK module to give your customers complete control over encryption keys. Customers can authorize or revoke keys as needed. Optionally, SaaS customers can issue valet keys to the SaaS application which limit the SaaS provider’s ability to decrypt data. In today’s climate, this dramatically reduces supply chain risks. Thus a Titaniam enabled SaaS provider is much more attractive to customers than one without Titaniam.
If you are looking to build a new application and you answer yes to the following questions, Titaniam Spectra is right for you. Contact us at firstname.lastname@example.org to get you started:
- Will there be any data actively utilized by your application that you would not like to see in the hands of cyber criminals or sold on the dark web. This includes but not limited to PII, PHI, payment card data, user or employee identity data, security data, asset or network data, user behavior information, trade secrets, intellectual property, business or organizational data.
- Is your application SaaS and would your compromise in turn compromise the security of your customers? I(i.e. supply chain or third party attack)
- If your application is a SaaS or houses data belonging to other enterprises, would you like to minimize the risk of being a compromised vendor by offering your customers full control of encryption keys (i.e. BYOK)?
- Is your organization concerned about ransomware and extortion and looking to take proactive measures in your defense?
If you are tasked with protecting a legacy application, Titaniam Spectra can help you achieve this task in a timely and cost efficient manner.
Titaniam Spectra can be dropped into legacy environments as a safe place to isolate sensitive data without disturbing legacy systems. By adding a pre-integrated proxy (Titaniam Ripple) in front of the legacy system, Titaniam transparently manages data flows between Titaniam Spectra and the legacy datastore and provides superior protection without requiring major changes to legacy systems.
If you would like to protect your legacy application and you answer yes to the following questions, Titaniam Spectra is right for you and you should contact us at email@example.com to get you started.
- Does your legacy application contain any data that you consider valuable including but not limited to PII, PHI, payment card data, user or employee identity data, security data, asset or network data, user behavior information, trade secrets, intellectual property, business or organizational data, or any other data that you would not like to see in the hands of cyber criminals or sold on the dark web?
- Do you consider your legacy application to be vulnerable?
- Is your organization concerned about protecting your legacy application from ransomware and extortion and looking to take proactive measures in its defense?
In the event of successful ransomware attacks on Titaniam Spectra follow these steps:
- Restore Titaniam Spectra from backup
- Ignore ransom demands for exfiltrated data