Tag Archives: keyless signature

Data Integrity Solution Provider Appoints Gustav Poola as Vice President of Products

Guardtime announced today that Mr. Gustav Poola has joined the company as Vice President of Products.

Palo Alto, CA (USA), Tuesday – June 05, 2012 — Guardtime ( http://www.guardtime.com ) announced today that Mr. Gustav Poola has joined the company as Vice President of Products. Poola brings to Guardtime a robust track record of performance and innovation based on more than 20 years of hardware design and managerial experience.

“Guardtime Keyless Signature technology represents a breakthrough in data validation for the enterprise, cloud, and telecommunications industries. I look forward to contributing to its widespread adoption, growth, and success,” Poola said.

For 12 years, Poola served as CEO of Artec Group, a leading provider of electrical engineering services with customers including STMicroelectronics and National Semiconductor. Under Poola’s management, Artec Group grew to over 70 employees and engineered many successful products such as the Geode SoC-based ThinCan product line, a reference design that revolutionized thin-computing in 2006. Prior to Artec, Poola worked for ZF Micro Solutions, Fujitsu, and Cabelco Technologies.

“I’m very pleased to welcome Gustav to the team,” said Guardtime CEO Mike Gault. “Guardtime’s technology is playing a critical role in providing independent validation of data and virtual machines in a cloud environment. Cloud computing is in its infancy, and aside from his general track record in creating successful products, we hope to leverage Gustav’s experience in appliance design to extend our scope deep into the hardware level.”

Guardtime’s patented Keyless Signature technology ( http://www.guardtime.com ) provides irrefutable proof of integrity for data stored on disk, residing in the Cloud, or in transit across networks. Keyless Signature-based solutions are being adopted by governments, telecommunications service providers, and cloud infrastructure vendors around the globe in order to enhance transparency and provide stakeholders an independent and irrefutable method of proving that the implemented data security measures are working properly.

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

All company names are trademarks of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

“Data Integrity in the Big Data Digital Age” gives data its proof in court.

San Francisco, CA (USA), Wednesday – April 18th, 2012 — A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment.

“When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity,” cites the report.

Titled “Data Integrity in the Big Data Digital Age”, the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency.

Sponsored by GuardTime, the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data.

“The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation,” the paper explains.

“A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data.”

“Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes.”

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.

In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with “The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption.”

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime and RDG China Collaborate on Digital Rights Management (DRM)

GuardTime today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd., to collaborate in the area of digital rights management.

Beijing, China, Monday – April 02, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology providing indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd. ( http://www.chinardg.com ), an application development firm offering products, solutions and services for the Chinese publishing industry, to collaborate in the area of digital rights management.

“We are excited to use GuardTime Keyless Signature technology in our large scale content signing for digital rights management. We have being searching for data signature solutions that should be scalable, cost effective, easy to integrate yet without an expiration date, for the Chinese publishing industry. Fortunately, we found GuardTime,” said Sarah Wang, CEO of RDG China. “With advanced technology provider GuardTime, we will strive to create digital publishing solutions that will help the Chinese publishing industry enhance their digital publishing capabilities quickly.”

With sizable research projects lined up for its central and provincial publishing regulation offices, RDG China is starting to push for a cloud-based system involving regulating offices, publishers, web sites, mobile phone SP and other digital content distribution channels with digital rights management as a core offering. This project can potentially bring a revolution to copyright protections in China and become a standard in the Chinese publishing industry.

GuardTime Keyless Signatures ( http://www.guardtime.com ) will be a key technology in this project.

About Read Digital Science & Technology Co., Ltd.:
RDG China is a large-scale application development firm, providing products, solutions and information technology professional services mainly for Chinese publishing industry. The company is headquartered in Beijing, with branch offices overseas. The company is committed for the publication and distribution, government, large corporations and industry customers to provide in-depth and long-term consulting, customized development and system integration services. For more information visit http://www.chinardg.com/en/pl.jsp

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Beijing, China
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime and NRI Secure Collaborate on Cloud Security

GuardTime today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

Tokyo, Japan, Tuesday – January 03, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

GuardTime developed and provides the solution code-named “DataConductor,” which can detect changes and/or transfers of any data stored in the datacenter. By signing the data using GuardTime’s Keyless Signatures, DataConductor can automatically detect when and where the data was created or transferred, and if the datahas been tampered with or not. An alert is sent to the customer when an abnormal status is detected. DataConductor can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data storage in the Cloud. DataConductor enables regulatory compliance for archiving with commodity cloud storage.

As a leading provider of information security, NRI Secure has accumulated extensive and profound consulting knowledge with product offerings that, together with one-stop services, provide comprehensive security solutions to customers in sectors such as the government, financial services, retail, and enterprises. In particular, as cloud computing demand grows, NRI Secure is increasingly undertaking a number of projects for the secure building and management of cloud services.

GuardTime and NRI Secure will leverage the solutions and know-how on both sides to collaborate in the following areas:

* Solution service integration:
Planning and development on the integration of GuardTime DataConductor into NRI Secure’s security management solutions and services.

* Joint marketing and sales activities:
Both companies will jointly hold seminars and conferences to introduce the solutions.Both companies will jointly identify business opportunities and propose solutions to existing and new customers.

About NRI SecureTechnologies, Ltd:
NRI SecureTechnologies, a leading provider of information security solutions, is one of the group companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management and offers a one-stop service from consulting to solution implementation, training, management and surveillance. For more information visit http://www.nri-secure.co.jp/en/index.html

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Tokyo, Japan
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Crew Systems Adopts Guardtime Keyless Signatures to Add Tamper Evidence to Daily Reports and Accident Videos for Monitored Vehicles

Crew Systems Inc, have established a strategic alliance by which Crew will adopt the GuardTime Keyless Signature Service to add tamper evidence to its daily and monthly reports and recorded video files.

Tokyo, Japan, Wednesday – November 16, 2011 — CREW SYSTEMS INC. (“Crew”), a video telematics cloud service provider, and GuardTime Japan,Inc., have established a strategic alliance by which Crew will adopt the GuardTime Keyless Signature Service to add tamper evidence to its daily and monthly reports and recorded video files as they are stored in the telematics cloud known as “HARVEST”. The HARVEST service is scheduled to be released on December 1, 2011.

HARVEST is an integrated safety driving support system which consists of a drive recorder, digital tachometer, and a real-time dynamic object management system. In HARVEST, the communication system uses built-in drive recorders mounted on vehicles to capture the behaviors of drivers, to record video images of traffic accidents as they occur, and to collect real-time information from the global positioning system (GPS). As the data is gathered, it is automatically sent to the HARVEST server in the Cloud. The server then processes, analyzes, and safely stores the data where it can automatically produce regular reports. The analysis and assessment of the data generate “safe driving” rankings. The system can also produce forensically-sound recorded video images capturing any traffic accidents that have occurred, or even recorded acts of unsafe driving.

By signing all of the digital data collected with GuardTime’s Keyless Signatures, Crew can provide proof that the data has not been tampered with in any way since it was signed, regardless of how it is transmitted to and stored in the Cloud. When submitting reports and associated video images for investigational purposes, Crew will significantly increase the reliability and credibility of the evidence with the addition of the unique GuardTime data integrity service.

Companies that own five or more vehicles for business use are required by safety driving management laws to produce daily reports on the driving habits of their employees. Systems that provide the automatic digitization of daily driving reports are increasingly used for operating efficiency. However, the integrity of the digitized and stored data has been left as a pending issue. In particular, video images capturing traffic accidents are increasing lybeing used as evidence in legal cases and for insurance claims. The admissibility of such data as evidence requires proof that the data is tamper-free.

Says Crew CEO Katsuhiko Hirayama,”The data in connection with a vehicle and a person’s safety requires high reliability and integrity. We decided to utilize GuardTime Keyless Signatures with our cloud service because it is easy to administer. The Keyless Signatures are extremely affordable in terms of integration and maintenance as compared to conventional time stamping-only or PKI-based services.”

Several thousand units of HARVEST drive recorders have been sold mainly to daycare service centers, construction companies, and logistic companies. It is expected that 10,000+ units will be sold annually to industrial waste disposal operators, companies leading reconstruction projects in disaster-stricken areas, and other enterprise organizations that own many business vehicles. This forecast holds true not only in Japan, but also within other markets overseas.

ABOUT CREW SYSTEMS, INC.
CEO: Katsuhiko Hiryama
Established : January, 2008
URL: http://www.crew-sys.com

About GuardTime:
A Red Herring Global 100 Winner and Frost & Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime’s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

All company names are trademarks of their respective owners.

GuardTime PR Contact:
Victor Cruz
MediaPR.net Inc
Tokyo, Japan
+1-978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime Keyless Signatures Selected by Cernam to Deliver the World’s First Purpose-Built System for Capturing Online Evidence

Cernam’s integration of GuardTime Keyless Signatures allows for the preservation of online content as legal evidence, delivering proof of integrity for a uniquely fragile form of digital data.

Singapore | Dublin, Wednesday – August 24, 2011 — GuardTime ( http://www.guardtime.com ), creator of Keyless Signature technology providing indisputable proof of time, origin, and data integrity for the world’s electronic information, today announced that its Keyless Signature technology has been adopted by Cernam, creators of the first purpose-built system for capturing and preserving evidence from online sources. Cernam’s technology enables investigators, attorneys and government agencies to capture online content in a forensically-sound manner and the addition of GuardTime’s Keyless Signature technology will provide cryptographically secure digital signatures, providing built-in tamper detection for all evidence captured using Cernam’s system.

When dealing with digital evidence, courts require forensic rigor in the collection of data, the capture of full and accurate content, the preservation of metadata, and the production of data as it originally existed. Cernam has designed its system from the ground up to meet these requirements and will now enhance its core technology by adding Keyless Signatures to provide mathematical proof of integrity, thereby removing the unnecessary reliance on trust.

Organizations dealing with online content as evidence can now leverage Cernam’s “Capture & Preserve” technology to collect evidence from websites, message boards, social networking sites, online productivity tools and web-based enterprise systems. By utilizing a purpose-built system which includes GuardTime’s Keyless Signature technology for proof of time and integrity, organizations can abandon evidentially-flawed methods such as screenshots and printouts, raising online content to the level of evidence experienced with email or hard disk forensics.

Attaching a GuardTime Keyless Signature ( http://www.guardtime.com ) to every item of evidence captured and preserved in the evidence container produced by the system, Cernam “Capture & Preserve” collects and packages the entire content of a web page or other online resource in an evidentially sound manner, providing survivable third-party verification of time and integrity without the reliance on any specific technology providers.

“When we set out to create the first purpose-built system to capture and preserve online evidence we knew we had to play to our strengths: the principles of digital evidence, modern web technologies and the use of digital evidence. We equally knew that we needed to integrate proven technology for secure digital timestamps and proof of integrity, rather than attempting to ‘roll our own,” said Owen O’Connor, founder and managing director of Cernam.

O’Connor continued: “GuardTime represents the ideal partner for Cernam since their Keyless Signature technology gives us two proof points which are fundamental to digital forensics and investigations: a) the exact point in time when evidence was collected; and b) proof that the evidence has not been changed or tampered with since the time it was collected.”

Cernam Capture & Preserve is currently in beta and will be released in late 2011. For details of Cernam’s online evidence technology, visit www.cernam.com.

About Cernam:
Cernam is a specialist digital investigations firm based in Dublin, Ireland that is focused on the use of online content as digital evidence. Building on a background in information security, electronic discovery, and corporate investigations, Cernam develops unique tools that bring forensic rigor to the collection, preservation and analysis of online evidence.

About GuardTime:
A Red Herring Global 100 Winner and Frost & Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime’s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done offline without the reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one where keyless signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the cloud.

Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Cernam PR Contact:
Karen Reilly, Cernam
+353 1 716 3784
karen@cernam.com

Press & Media Contact:
Victor Cruz
For GuardTime
MediaPR.net Inc
Singapore
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com