Rimon Technology

Security Beyond Boundaries

Cryptography as a service

Security beyond boundaries

The continuous redefinition of the physical places in which users, data and applications reside, requires the adoption of new operational models.

Business processes take place in distributed environments and make use of transnational infrastructures that are subject to different jurisdictions and whose complete control is not always possible. Heterogeneous actors with different rights of access to information need to interact and exchange data securely.

In this context, the defense of physical systems and technological elements such as user devices, networks, servers, applications, or the Cloud is not enough.

Rimon Technology introduces a new security model that provides fine-grained access control on encryption along the whole lifecycle of the user’s data, regardless of its location in a structured and usable approach.

Post Quantum Readiness

Quantum doomsday is getting closer with each advancement of technology in the global race to quantum computing.

Quantum Computers will soon be able to breach today's security

Tomorrow's quantum threat requires our data to be safe from now, as many hostile organizations are collecting encrypted data while waiting for the quantum computer to be available.

Security is based on a proprietary protocol that combines and extends the symmetric and public key cryptography used in Cloud services by introducing granular permission control and key management according to a scheme resistant to known Post Quantum Computing (PQC) attacks.

Features

Phasellus convallis elit id ullamcorper pulvinar. Duis aliquam turpis mauris, eu ultricies erat malesuada quis. Aliquam dapibus, lacus eget hendrerit bibendum, urna est aliquam sem, sit amet imperdiet est velit quis lorem.

Key management

Autonomous key management by the end user

Control over cryptography

Cryptography shifts the control problem from the data to the key; therefore, we provide key control to the user and the organization, with the ability to intervene at any point in the process.

Security inside the data

We focus on controlling the data and not the perimeter by strengthening cryptography, as the infrastructure is distributed and shared, thus not very controllable directly.

Solve regulatory issues

We solve the problem of regulatory conflict, identifying the virtual perimeter of attribution to the user and therefore of application of the correct jurisdiction.

Separation of cryptography from applications

Separation of encrypted keys and encryption operations from third-party data and applications.

Internet of Things and Edge Computing ready

Distributed infrastructure ready.

Get in touch

Get in touch with our team.