DSTB | Dyadic Secures The Breach

Summary
Over the last years, the world has seen an unprecedented escalation in the number and size of data breaches. In 2013, a total of 550 million identities were breached; a 62% increase over 2012. In addition, the cost of breaches is rising, with a worldwide average of over $3 million per breach. Hacking is the primary causes of data breaches, and today’s existing solutions are simply not sufficient to meet the threat.

The objective of Dyadic Security is to provide high security to organizations, and to protect digital assets, even in the event of a network breach. Dyadic’s Distributed Security Module (DSM) is a unique software-only offering that provides the highest level of security while being affordable and easy to deploy. At the core of the DSM lies cutting-edge technology based on decades of cryptographic research on secure multiparty computation (MPC). Dyadic’s DSM solves the inherent single point of failure in all of today’s security systems. Strong cryptographic solutions exist for protecting data, securing web traffic, authenticating users, and so on. However, they all rely on the secret key and authentication credentials (e.g., passwords) remaining secret. In today’s reality where hackers get past firewalls and penetrate deep into networks, these keys and credentials are stolen thereby rendering all cryptographic protection useless. Dyadic’s DSM randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced protocols used in the DSM ensure that even if some of the servers are breached and completely controlled by an attacker, the secrets and credentials cannot be stolen. The result is that digital assets remain safe, even when all else has failed and attackers are inside the network.

Dyadic has a disruptive and innovative product range which, in contrast to existing solutions, provides protection in the event of a breach, and not just detection.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/666148
Start date: 01-04-2015
End date: 31-03-2017
Total budget - Public funding: 2 882 500,00 Euro - 2 017 750,00 Euro
Cordis data

Original description

Over the last years, the world has seen an unprecedented escalation in the number and size of data breaches. In 2013, a total of 550 million identities were breached; a 62% increase over 2012. In addition, the cost of breaches is rising, with a worldwide average of over $3 million per breach. Hacking is the primary causes of data breaches, and today’s existing solutions are simply not sufficient to meet the threat.

The objective of Dyadic Security is to provide high security to organizations, and to protect digital assets, even in the event of a network breach. Dyadic’s Distributed Security Module (DSM) is a unique software-only offering that provides the highest level of security while being affordable and easy to deploy. At the core of the DSM lies cutting-edge technology based on decades of cryptographic research on secure multiparty computation (MPC). Dyadic’s DSM solves the inherent single point of failure in all of today’s security systems. Strong cryptographic solutions exist for protecting data, securing web traffic, authenticating users, and so on. However, they all rely on the secret key and authentication credentials (e.g., passwords) remaining secret. In today’s reality where hackers get past firewalls and penetrate deep into networks, these keys and credentials are stolen thereby rendering all cryptographic protection useless. Dyadic’s DSM randomly splits keys and credentials across servers so that they are never in any single place to be stolen. The advanced protocols used in the DSM ensure that even if some of the servers are breached and completely controlled by an attacker, the secrets and credentials cannot be stolen. The result is that digital assets remain safe, even when all else has failed and attackers are inside the network.

Dyadic has a disruptive and innovative product range which, in contrast to existing solutions, provides protection in the event of a breach, and not just detection.

Status

CLOSED

Call topic

ICT-37-2014

Update Date

27-10-2022
Images
No images available.
Geographical location(s)
Structured mapping
Unfold all
/
Fold all
Horizon 2020
H2020-EU.2. INDUSTRIAL LEADERSHIP
H2020-EU.2.1. INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies
H2020-EU.2.1.1. INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)
H2020-EU.2.1.1.0. INDUSTRIAL LEADERSHIP - ICT - Cross-cutting calls
H2020-SMEINST-2-2014
ICT-37-2014 Open Disruptive Innovation Scheme (implemented through the SME instrument)
H2020-EU.2.3. INDUSTRIAL LEADERSHIP - Innovation In SMEs
H2020-EU.2.3.1. Mainstreaming SME support, especially through a dedicated instrument
H2020-SMEINST-2-2014
ICT-37-2014 Open Disruptive Innovation Scheme (implemented through the SME instrument)