K2View innovates in data management with new encryption patent
Organizations can encrypt data associated with a specific person, place or thing
On May 19, the U.S. Patent and Trademark Office issued a patent to K2View for a new encryption. This patented approach provides a more secure method for encrypting data. It’s based on the concept of “a hierarchical structure of encryption keys for information stored in a database.”
K2View enables companies to use a data operations methodology, which is a set of people, processes and technology that focuses on “delivering the right data, to the right place, at the right time.” This methodology is based on the firm’s patented Digital Entity, a person, place or thing recreated digitally out of its data. The Digital Entity delivers data about the business in real time for almost any situation.
A DataOps methodology must pair with security by design. The new patent involves K2View’s method for uniquely encrypting data at three different levels at the same time: during deployment, at the digital entity category level (e.g., customers) and at the individual entity level (e.g., Jane Doe).
“When combined with our previously patented Digital Entity, it’s now possible to encrypt every micro-database individually,” said Achi Rotem, CTO and co-founder, K2View. “So, if you’re a financial services company and have millions or billions of credit cards, a hacker would now need to hack each individually encrypted database to achieve a mass breach. Similarly, if you’re a consumer company with millions of customers, like a telco or a retailer, a hacker now needs to hack millions of individually encrypted databases – one per customer – for a mass breach to occur.”
K2View provides advanced data fabric, data integration and data delivery software. Its main product, K2View Fabric, uses patented logical unit technology to enable secure access and control of an organization’s data across any number of systems and data sources.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now