How data centric security works
We are witnessing a paradigm shift: away from protecting one's own IT infrastructure and toward data centric security. To take this fundamental step, the solution's inventor, Dr. Bruno Quint, and his team at Rohde & Schwarz Cybersecurity have developed a combination of virtualization, encryption and file fragmentation. And it works like this: when a document is uploaded to the cloud, a virtualized version of the original document is created. This virtual document contains only the metadata of the original, such as keywords, but actually has no content of its own. An unauthorized reader sees that a blank document is being transmitted, but not what the original actually contains. The document as such remains in the workflow, but is worthless to hackers or intelligence agencies.
The original document, meanwhile, is encrypted and fragmented; figuratively speaking, it is transformed into digital dust. These dust particles are then stored on different, freely selectable storage systems. This means that the original document can never be viewed in its entirety. Even quantum computers with their enormous computing power are helpless. The distributed chunks cannot be cracked because they are only fragments of the encrypted data. The shredded document only becomes visible when all the chunks are reassembled and decrypted.
Dr. Bruno Quint explains: "The data protection authorities, after all, have not banned users from using the cloud, and they have not banned cooperation with the major providers. What matters is regaining sovereignty over the data. And in a cloud environment, the data is the only thing we own." Cloud providers based outside of Europe are sometimes forced by law to hand over data to their respective government agencies. "They see R&S®Trusted Gate as an effective customer tool for preventing this," says Daniel Heck, Vice President Marketing Rohde & Schwarz Cybersecurity, "and they maintain a good working relationship with us as a result."
The fundamentally new software solution is very easy to use. Public authorities and companies can install R&S®Trusted Gate and have it up and running within 24 hours. Case in point: a German non-profit organization wanted to handle its internal communications using a standard collaboration tool, and at the same time to ensure that personal and health-related data remained protected in the public cloud. R&S®Trusted Gate was deployed on the desired platform, and the installation was fully configured within a day by professional remote support. Employees were able to continue working together the next day as they always had, with no additional training. Chat is also encrypted. Other typical cases in which R&S®Trusted Gate represented a quick solution include a biotechnology company that uses R&S®Trusted Gate to protect itself against industrial espionage and an aviation company that can process its satellite data in encrypted form – and thus securely.