Tag Archives: security solutions

Canbank Venture Capital Fund (CVCFL) picks up Stake in Shiva Industrial Security Agency Pvt Ltd (SISA), Surat

* SISA is a leading  ISO Certified Pan India Security Services Company having more than 4000 Guards and 150 plus cash Vans, with a turnover exceeding Rs 55 Cr. * SISA to deploy funds for expansion of operations across India.

Mumbai, India, June 08, 2015 —
Canbank Venture Capital Fund through its Fifth Fund viz., Emerging India Growth Fund has invested Rs.11 Cr by way equity shares and convertibles for a minority stake in Surat based M/s Shiva Industrial Security Agency (Guj) Pvt Ltd (SISA).

SISA is a leading ISO Certified Pan India Security Services Company having more than 4000 Guards and 150 plus cash Vans, with a turnover exceeding Rs 55 cr. Among the security solutions offered by SISA are Manned Guarding, Cash Handling, Electronic Security Equipment, Event Security and Emergency Response Services.  With a nationwide presence, SISA is providing security services to leading corporates, Industrial Units, Airports, Metro Stations, Public & Private Sector Banks, Malls/shopping complexes, Apartments, Hospitals etc.

Said  Mr S Thiruvadi, Managing Director, Canbank Venture Capital Fund Ltd. (CVCFL) , “The Private Security services sector in India is expected to grow at 20% annually up to 2019 with 90% of security comprising of manned guarding and secure cash movement.  SISA has a progressive professional management which envisages taking the company on fast track growth. CVCFL anticipates that the company through profitable business mix and quality management shall be able to offer significant returns through dividends and capital appreciation on exit.  CVCFL aims to assist unlisted mid stage/late stage companies in the manufacturing and services sector with good growth potential and require funding”

Indian private security services industry has an estimated business of Rs.30,000 Cr and has been repeatedly growing at 15-20% annually and FICCI expects it to cross Rs.60,000 Cr by 2020.  But only 60% of this is in the organized sector and ‘physical guarding’ accounts for bulk of the revenue.  The private security services industry is one of the largest employers in India.  There are around 6.5 million private security personnel employed across India and it is expected to continue to grow in the future.

States Sameer Sharma, MD, SISA, “We have been looking for funds to expand and upgrade our operations especially in the field of Physical guarding and Cash Management Services. The funds from CVFCL shall be deployed towards adding Branches to boost the existing guarding strength and also to increase our Cash Van fleet strength by adding another 100 Cash Vans this Financial Year 2015-16. The company also proposes to give added thrust to high margin business segment like Emergency Response Services & Event Management Security services. The aim is to become one amongst India’s top ten Security Services Providers and reach a turnover of Rs 150 Crore by FY 2017-18.

Press & Media Contact:
Mitesh M Kapadia
Sentinel Public Relations Pvt Ltd / Sentinel Advertising Services
B-603, Samajdeep, Near Bhanu Park/Seasons Restaurant
Adukia Road, Off S V Road
Kandivli (W), Mumbai 400 067 India
Mob: +91 98205 03876
Tel: (022) 28625131/32
Fax: (022) 28625133
mitesh@publicrelationindia.com
http://www.publicrelationindia.com

Cyberoam Rolls Out CyberoamOS 10.6.2 Offering Major Performance Improvements

Offers big leap in firewall, UTM, IPS and AV throughputs.

Edison, NJ (USA), January 20, 2015 — Cyberoam, a leading global network security provider, has announced a new firmware — CyberoamOS 10.6.2 for its UTM and NGFW security appliances. Among many updates included in the new firmware are the increase in Firewall throughputs by up to 430%, IPS throughputs by up to 210% and UTM throughputs by up to 190%; inclusion of User Threat Quotient (UTQ) offering security intelligence to spot risky users in network; availability of Cyberoam in Discover mode (popularly known as TAP mode) to help partners and customers evaluate Cyberoam security; and Application Visibility & Controls for HTTPS-based Micro-Apps.

Evolving IT trends like BYOD, application explosion, virtualization, and more, are putting tremendous pressure on today’s network security solutions to deliver higher throughputs and performance in order to keep networks secure and not let security become a bottleneck in network performance. CyberoamOS 10.6.2 meets these requirements of small offices, mid-market to large and distributed enterprises, with this performance advantage becoming available for the entire family of Cyberoam security appliances.

Says Mr. Abhilash Sonwane, SVP – Products & Technology, Cyberoam: “We moved many notches up in offering high-performance security at the time of launching our NG Series security appliances. With CyberoamOS 10.6.2, we have touched even higher scales by further leveraging the fast path technology over Cyberoam’s multi-core platform. Our new performance breakthroughs will help Cyberoam customers boost network security performance without changing their existing hardware.”

The higher performance and faster throughputs coming with CyberoamOS 10.6.2 will offer Cyberoam customers maximum protection out of Cyberoam security features (firewall, IPS, AV, UTM). The enhancements in CyberoamOS 10.6.2 also offer following new functionalities to customers on their security appliances:

User Threat Quotient (UTQ): Available as a report, UTQ harnesses information derived out of web traffic and offers patterns of user behavior to determine risky users in a network. UTQ is available on Cyberoam’s Next-Generation Firewall and UTM appliances.

Application Visibility and Control for Micro Apps: Provides deep-scanning for HTTPS based applications, allowing granular control over various micro-apps within the larger app ecosystems such as Facebook, Google and the like.

Among other key features becoming available include Radius Single-Sign-On (RSSO), IPv6 Traffic Load-balancing support in HA, Secure SMTP and availability of Discover Mode (popularly called TAP mode) that makes PoC evaluation of Cyberoam security appliances simpler, easier and faster.

Cyberoam continues to invest and focus on product innovation and development with important releases and updates to ensure continued success for its customers and partners. Staying steadfast in its product strategy, Cyberoam is committed to deliver the highest competitive advantage that its technology has, to yield the best possible combination of performance and price. Underscoring the same strategy, the new CyberoamOS ensures that large and small customers benefit from the performance improvements of its security appliances.

About Cyberoam Technologies Limited:
Cyberoam Technologies, a Sophos Company, is a global Network Security appliances provider, offering future-ready security solutions to physical and virtual networks in organizations with its Next-Generation Firewalls (NGFWs) and Unified Threat Management (UTM) appliances. The virtual and hardware Cyberoam Central Console appliances offer Centralized Security Management options to organizations, while Cyberoam iView allows intelligent logging and reporting with one-of-their-kind, in-depth reports. Cyberoam is accredited with prestigious global standards and certifications like EAL4+, CheckMark UTM Level 5 Certification, ICSA Labs, IPv6 Gold logo, and is a member of the Virtual Private Network Consortium. For more information, please visit http://www.cyberoam.com

Press & Media Contact:
Jitendra Bulani
Cyberoam Technologies Limited
505 Thornall Street, Suite # 304
Edison, NJ – 08837 – USA
+1-847-235-4684
jitendra.bulani@cyberoam.com
http://www.cyberoam.com

Jian Tan of Guardtime Awarded 2M RMB to Increase Transparency and Security in China’s Communication Networks

Guardtime today announced that its China General Manager Jian Tan has been awarded the 2M RMB Shanglin prize from the ZheJiang Cixi government to help establish Keyless Signature Infrastructure in China.

Beijing, China, October 02, 2012 — Guardtime ( http://www.guardtime.com ) today announced that its China General Manager Jian Tan has been awarded the 2M RMB (approx. U.S. $317,000) Shanglin prize from the ZheJiang Cixi government to help establish Keyless Signature Infrastructure in China.

Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party.

“The Shanglin prize is very prestigious and we are thrilled to be the first foreign company to be awarded the prize,” said Jian Tan, General Manager of Guardtime China.

Jian Tan added, “The 2M RMB award will allow us to accelerate Guardtime’s ( http://www.guardtime.com ) vision of bringing transparency and security to China’s communication networks. With keyless signatures integrated tightly with messaging protocols it is possible to provide a completely independent audit trail for machine to machine and human communication removing any doubt about the integrity, time and origin of the communicated data. ”

Wang Liyun, Chair of the Shanglin nomination committee said, “Keyless Signature Infrastructure is a revolutionary technology with the potential to greatly advance the transparency and security of the China’s communication networks. Mr. Jian Tan, Chief Executive of Guardtime China is a skilled entrepreneur and we are delighted to award him and Guardtime China the Shanglin prize.”

Guardtime CEO Mike Gault said, “Guardtime recently joined the Global Cloud Network of infrastructure and software companies including Joyent, Fixmo and Voxeo labs that are dedicated to building a next- generation cloud infrastructure for mobile first markets such as China and winning this award reiterates the importance placed on transparency and security.”

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of signing time, entity and integrity of data. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Visit http://www.guardtime.com for more information.

About Shanglin:
The Shanglin prize is provided by the CIxi government in Zhejiang province yearly to award the top entrepreneurs in China who show great potential with unique technologies that can help accelerate China’s economic progress. The prize includes 2M RMB award along with numerous commercial benefits. For more information visit: http://slyc.cixi.gov.cn/chinese/newsinfo.asp?id=32.

Press & Media Contact:
Victor Cruz, Principal
MediaPR for Guardtime
Beijing, China
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Guardtime Keyless Signatures Provide a Regulatory Compliant Audit Trail for WDX Market Reference Data

WOCU’s integration of the Guardtime Keyless Signatures provides independent and legally enforceable proof that distributed WOCU fixing data has not been compromised.

Palo Alto, CA (USA) / London (UK), Tuesday – August 07, 2012 — Excessive volatility in foreign exchange rates creates a tremendous amount of business uncertainty, the WOCU® World Currency Unit by WDX Organisation is a contemporary derivative currency basket comprised of quoted currencies, providing the perfect “off the shelf” natural currency stabilization solution to this issue. The guarantee of accuracy and authenticity of this data must be absolute for regulatory authorities and auditors in the event of a dispute. WOCU’s integration of the Guardtime Keyless Signatures provides independent and legally enforceable proof that distributed WOCU fixing data has not been compromised.

“The recent Libor scandals show how important it is for financial institutions to have a secure audit trail around market reference data, one that will stand up in court and regulatory compliance and cannot be manipulated by insiders with system access. There here is no better example than WDX and WOCU,” says Mike Gault, CEO of Guardtime. “We’re happy to help WDX in securing an audit trail for their market reference data, a solution especially relevant in today’s economic climate.”

Mike Blakey, Managing Director of the WDX Organisation, said, “WOCU data and applications allow our clients to fully recognize the value of the WOCU as a natural currency stabilizer. With the integration of the Guardtime Keyless Signatures ( http://www.guardtime.com ), our clients now have the proof they need that WOCU fixing data is authentic and tamper-free. This supports our goal of promulgating the unfettered use of the WOCU in markets and businesses around the world.”

As a result of the integration of Guardtime Keyless Signatures ( http://www.guardtime.com ), all WOCU fixing data is indelibly signed to prove integrity and authenticity, concurrent with delivery to WOCU subscribers; WDX Organisation Limited maintain long-term proof of integrity for historical currency values without the need to manage complex and expensive PKI-based systems.

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

About WDX Organisation Limited and the WOCU:
WDX is a private company based in London, England. It is the owner and distributor of the WOCU, a standardised, apolitical, real time derivative currency quotation based on the real time exchange rates of the currency pairs of the world’s top 20 nations as determined by IMF measures of GDP. The WOCU, its constituent currency pairs weighted in line with GDPs, is a generally less volatile currency unit than traditional currency pairs, balancing currency risk and offering commercial advantage for users. WOCU prices, information about WDX and other data can be found at http://www.wocu.com.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://mediapr.net
http://www.guardtime.com

World’s First Tamper-Evident Cloud – Estonian Telco Levira Teams Up with Joyent and Guardtime

Joyent and Guardtime’s cloud computing technology enables Levira, the Estonian government’s majority owned service provider, to offer secure cloud-computing services to Governments and enterprises in Scandinavia and Central and Eastern Europe.

Palo Alto, CA (USA), Friday – June 29, 2012 — Joyent and Guardtime’s cloud computing technology ( http://www.guardtime.com ) enables Levira, the Estonian government’s majority owned service provider, to offer secure cloud-computing services to Governments and enterprises in Scandinavia and Central and Eastern Europe. Levira also aims to start providing secure cloud services for multinational corporations that need to comply with the data residency requirements also outside of their home soil.

“Joyent’s double hulled virtualization and Guardtime’s keyless signature technology makes a formidable combination for enterprises and governments who wish to move to a cloud computing environment but hesitate due to security and trust-related concerns,” said Mart Einpalu, CEO of Levira. “Our mission is to become a leading cloud computing service provider in Scandinavia and Central and Eastern Europe and our unique ability to give our clients tools to prove with mathematical certainty that their data has been safe and in compliance with the regulations is a paramount requirement to achieve that.”

Joyent’s Smart Data Center technology today powers numerous carriers and large scale service providers around the world including Uniserve Communications, LinkedIN and others. Jason Hoffman, CTO of Joyent said, “Estonia is at the forefront of technology innovation and it is no surprise that companies like Skype and Guardtime are developing cutting edge technologies there. We are thrilled to have a strategic partnership with Guardtime to offer the world’s first tamper-evident cloud.”

“Previously the clients of cloud computing services had no choice but to blindly trust their service provider,” added Mike Gault, CEO of Guardtime. ( http://www.guardtime.com ) “With the integration of Guardtime’s keyless signature technology into Joyent’s Smart Data Center, clients can have an independently verifiable audit trail for everything that happens in their service provider’s environment. Our strategic partnership with Joyent represents a major breakthrough in enterprise risk management and audit preparedness in distributed IT infrastructure and will ease the transition to cloud computing, especially important for governments and enterprise clients with heightened security and compliance requirements.”

About Levira:
Levira is the provider of infrastructure services to IT, media and telecom segments. Headquartered in Tallinn, Estonia, Levira is the largest provider of TV playout services in the Northern Europe and the main TV- and radio broadcast transmission provider in Estonia. Levira operates one of the largest datacentres in Estonia and provides public and private cloud services using Joyent’s Smart Data Center technology. Levira provides IT, media and telecom infrastructure and business process outsourcing services to many multinational and regional players like Turner, Fox, TeliaSonera, Sony, MTG and others in Scandinavia and Central and Eastern Europe.

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

About Joyent:
Joyent is the cloud infrastructure performance company, offering enterprises and developers the best public, private and hybrid cloud infrastructure for today’s modern data-intensive, real-time (DIRTy) applications. JoyentCloud.com delivers public cloud services to some of the most innovative companies in the world, including LinkedIn, Voxer, and Gilt Groupe. Node.js, the open source server-side JavaScript project owned and stewarded by Joyent, provides developers and enterprises such as Microsoft with the most powerful runtime for developing data-intensive, real-time apps. SmartDataCenter orchestrates Joyent’s technologies into a cohesive, reliable and distributed system that can stand up to the compute demands of the modern world. For more information, visit http://www.joyent.com.

All company names are trademarks of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Cognuse Adopts Guardtime Keyless Signature Technology for Data Integrity

Guardtime’s Keyless Signature technology enables Cognuse, to offer trustworthy, tamper-evident e-health products by providing proof of origin, time, and integrity for all data processed by the CognuseManager system, including patient health records.

Palo Alto, CA (USA), Thursday – June 07, 2012 — Guardtime’s Keyless Signature technology enables Cognuse ( http://www.cognuse.com ), creator of the world’s most comprehensive executive functions rehabilitation system, to offer trustworthy, tamper-evident e-health products by providing proof of origin, time, and integrity for all data processed by the CognuseManager system, including patient health records.

The Guardtime integration into CognuseManager, which is the central management system for Cognuse’s products, will cover all critical data within the system, including web server SSL logs, application logs, anonymized/non-anonymized patient profile database transaction logs, patient health record database transaction logs, routine backups, and archived data. For future purposes, Cognuse is also looking into utilizing Guardtime’s Keyless Signature Service for automatic PDF signing for patient progress and incident reports.

“In healthcare, making decisions based on accurate data is a matter of life and death. Guardtime’s solution gives healthcare professionals a good reason for transitioning to e-health applications as they can be certain that the patient’s data is valid and intact,” said Mike Gault, CEO of Guardtime ( http://www.guardtime.com ).

“Guardtime keyless signing technology is an easy-to-use solution for e-health applications and plays a critical role in building the trust required within our target medical community in several markets. Processing of patient health records is constantly being scrutinized for privacy and security concerns and we are excited to be working with Guardtime in getting a step closer to a highly trustworthy e-health application,” said Andres Mellik, CTO of Cognuse.

About Cognuse
Cognuse produces and manufactures systems and devices specifically for cognitive rehabilitation. Cognuse’s clients are professional healthcare service providers who specialize in brain health treatments, diagnostics, and rehabilitation services – facilities such as hospitals with in-house mental health rehabilitation, mental health rehabilitation clinics, and elderly care institutions.

For more information visit: http://www.cognuse.com

Cognuse Contact
Andres Mellik, CTO
andres.mellik@cognuse.com

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

All company names are trademarks of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Data Integrity Solution Provider Appoints Gustav Poola as Vice President of Products

Guardtime announced today that Mr. Gustav Poola has joined the company as Vice President of Products.

Palo Alto, CA (USA), Tuesday – June 05, 2012 — Guardtime ( http://www.guardtime.com ) announced today that Mr. Gustav Poola has joined the company as Vice President of Products. Poola brings to Guardtime a robust track record of performance and innovation based on more than 20 years of hardware design and managerial experience.

“Guardtime Keyless Signature technology represents a breakthrough in data validation for the enterprise, cloud, and telecommunications industries. I look forward to contributing to its widespread adoption, growth, and success,” Poola said.

For 12 years, Poola served as CEO of Artec Group, a leading provider of electrical engineering services with customers including STMicroelectronics and National Semiconductor. Under Poola’s management, Artec Group grew to over 70 employees and engineered many successful products such as the Geode SoC-based ThinCan product line, a reference design that revolutionized thin-computing in 2006. Prior to Artec, Poola worked for ZF Micro Solutions, Fujitsu, and Cabelco Technologies.

“I’m very pleased to welcome Gustav to the team,” said Guardtime CEO Mike Gault. “Guardtime’s technology is playing a critical role in providing independent validation of data and virtual machines in a cloud environment. Cloud computing is in its infancy, and aside from his general track record in creating successful products, we hope to leverage Gustav’s experience in appliance design to extend our scope deep into the hardware level.”

Guardtime’s patented Keyless Signature technology ( http://www.guardtime.com ) provides irrefutable proof of integrity for data stored on disk, residing in the Cloud, or in transit across networks. Keyless Signature-based solutions are being adopted by governments, telecommunications service providers, and cloud infrastructure vendors around the globe in order to enhance transparency and provide stakeholders an independent and irrefutable method of proving that the implemented data security measures are working properly.

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

All company names are trademarks of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

“Data Integrity in the Big Data Digital Age” gives data its proof in court.

San Francisco, CA (USA), Wednesday – April 18th, 2012 — A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment.

“When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity,” cites the report.

Titled “Data Integrity in the Big Data Digital Age”, the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency.

Sponsored by GuardTime, the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data.

“The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation,” the paper explains.

“A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data.”

“Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes.”

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.

In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with “The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption.”

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime and RDG China Collaborate on Digital Rights Management (DRM)

GuardTime today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd., to collaborate in the area of digital rights management.

Beijing, China, Monday – April 02, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology providing indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd. ( http://www.chinardg.com ), an application development firm offering products, solutions and services for the Chinese publishing industry, to collaborate in the area of digital rights management.

“We are excited to use GuardTime Keyless Signature technology in our large scale content signing for digital rights management. We have being searching for data signature solutions that should be scalable, cost effective, easy to integrate yet without an expiration date, for the Chinese publishing industry. Fortunately, we found GuardTime,” said Sarah Wang, CEO of RDG China. “With advanced technology provider GuardTime, we will strive to create digital publishing solutions that will help the Chinese publishing industry enhance their digital publishing capabilities quickly.”

With sizable research projects lined up for its central and provincial publishing regulation offices, RDG China is starting to push for a cloud-based system involving regulating offices, publishers, web sites, mobile phone SP and other digital content distribution channels with digital rights management as a core offering. This project can potentially bring a revolution to copyright protections in China and become a standard in the Chinese publishing industry.

GuardTime Keyless Signatures ( http://www.guardtime.com ) will be a key technology in this project.

About Read Digital Science & Technology Co., Ltd.:
RDG China is a large-scale application development firm, providing products, solutions and information technology professional services mainly for Chinese publishing industry. The company is headquartered in Beijing, with branch offices overseas. The company is committed for the publication and distribution, government, large corporations and industry customers to provide in-depth and long-term consulting, customized development and system integration services. For more information visit http://www.chinardg.com/en/pl.jsp

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Beijing, China
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime and NRI Secure Collaborate on Cloud Security

GuardTime today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

Tokyo, Japan, Tuesday – January 03, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

GuardTime developed and provides the solution code-named “DataConductor,” which can detect changes and/or transfers of any data stored in the datacenter. By signing the data using GuardTime’s Keyless Signatures, DataConductor can automatically detect when and where the data was created or transferred, and if the datahas been tampered with or not. An alert is sent to the customer when an abnormal status is detected. DataConductor can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data storage in the Cloud. DataConductor enables regulatory compliance for archiving with commodity cloud storage.

As a leading provider of information security, NRI Secure has accumulated extensive and profound consulting knowledge with product offerings that, together with one-stop services, provide comprehensive security solutions to customers in sectors such as the government, financial services, retail, and enterprises. In particular, as cloud computing demand grows, NRI Secure is increasingly undertaking a number of projects for the secure building and management of cloud services.

GuardTime and NRI Secure will leverage the solutions and know-how on both sides to collaborate in the following areas:

* Solution service integration:
Planning and development on the integration of GuardTime DataConductor into NRI Secure’s security management solutions and services.

* Joint marketing and sales activities:
Both companies will jointly hold seminars and conferences to introduce the solutions.Both companies will jointly identify business opportunities and propose solutions to existing and new customers.

About NRI SecureTechnologies, Ltd:
NRI SecureTechnologies, a leading provider of information security solutions, is one of the group companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management and offers a one-stop service from consulting to solution implementation, training, management and surveillance. For more information visit http://www.nri-secure.co.jp/en/index.html

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Tokyo, Japan
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com