Cloud Security Analytics
CASB
Cloud Access Security Broker
Cloud Encryption

Innovation: Not an Afterthought

StratoKey was designed to encrypt, monitor and defend sensitive data. Cutting edge R&D produced the first Active Countermeasure defense system for cloud application security. The StratoKey visualization and data intelligence engine is second to none, streaming real time information to administrators. This real-time data interface goes well beyond basic analytics and user management. The Command Interface is a full service offering that would make any SIEM vendor envious. This combination of encryption, countermeasures, real-time monitoring and Data Intelligence makes StratoKey a compelling cloud and web application encryption offering.


StratoKey Innovations

Whilst StratoKey supports all the standard encryption, key management and user/group management features, it also supports some unique world-first innovations. We call these day 1 innovations. These innovations are unique to StratoKey and provide a compelling demonstration of StratoKey's capabilities.

 

Countermeasures: Active Countermeasures protect your data at its core. StratoKey analyses user interactions and automates countermeasures to thwart data breaches. StratoKey is the only provider to offer a complete set of proactive, customizable defenses. StratoKey employs specific data gathering and intelligence features to detect critical security events, such as user account hijacking. Countermeasures can be as simple as locking user accounts and session challenges, through to advanced honey pot data, defensive payload deployment and redirections. Understanding User patterns to build defenses: StratoKey has a unique capability to observe and learn about how your users interact with your system on an individual basis. Utilizing this learned understanding, StratoKey builds up a formidable defensive structure to protect against account hijacking and user credential theft. StratoKey risk-ranks every communication from your users to the application. If the user's interaction profile does not match, StratoKey immediately enacts appropriate countermeasures. This learned understanding is key to preventing unauthorized access to your applications and to prevent your data from breaches. Command Interface: Utilizing compelling visualizations, StratoKey puts all the pieces of cloud and web application security together into a single intelligent application. The Command Interface provides a logical, comprehensive analytics platform driven by real-time data. This platform provides administrators with the ability to interact, monitor and defend against threats. It also provides a convenient platform to manage users, groups and applications under the protection of StratoKey. Analytics - no "add-on" afterthought: Understanding, monitoring and analyzing user interactions is a core facet of any active defense system. These crucial pieces of the security infrastructure provided by StratoKey are not "add-ons" or afterthoughts. These are fundamental pieces to ensure that administrators and data security professionals have timely, relevant information at their fingertips in the event of advanced threats. Code Red: In the event of a critical security breach, it is not always possible to take Cloud and SaaS applications offline at a moment's notice. Due to the fact that the Cloud and SaaS is provided by third-party organizations, it means that there will always be delays in taking data offline in critical situations. StratoKey provides a "Code Red" button that allows administrators to immediately take application encryption keys offline. This Code Red mechanism could be the difference between a severe data breach and a threat thwarted. The Code Red is another unmatched StratoKey day 1 innovation.

Non-specific Application Support

We won't tell you all about a specific application we support. The reason for this is that StratoKey supports all cloud/web/SaaS applications. StratoKey was architected to function with any application that resides on the web or in the cloud. This architecture meant we designed StratoKey with a flexible underlying configuration. This configuration is straight forward and our experience is that we got this right. It takes less than an hour to configure StratoKey to support an entirely new application. StratoKey has the benefit of supporting all applications. Not a retro-fit, not a "connector", a day 1 design consideration.

A Fighting Chance at Defending Data

At the end of the day, our sole consideration for all of our day 1 innovation is to protect your data. Your data protection is our business and we take that very seriously. StratoKey provides organizations with a fighting chance at defending, identifying and mitigating threats as and when they occur.