Menu

How it Works / Data Level Security

By securing the data at the data level, GDS is able to provide pervasive and persistent data security wherever that data goes, even across domain boundaries

The typical model of data security relies on the Network and Operating Systems. Typically, the only additional security layers are within a database, if one exists. However, in all cases that security stays within the domain even when the data leaves. This is felt most painfully when data is removed and can then be examined without restriction by hackers, as Sony, Anthem and hundreds of other companies have learned.


datalevelsecurity_1

Complete rethinking of network data handling

GDS reverses the traditional model of Network and Operating System security, and puts all of the security around the data at file level. By securing the data at this level, GDS is able to provide pervasive and persistent data security wherever that data goes, even across domain boundaries – whilst maintaining full control of who is able to access the data.

The graphic below demonstrates what happens to data in the traditional model, when all Network and Operating System security has been breached. Whereas with the GDS Ecosystem deployed, even if intruders were to breach the network defenses, the data would be useless as it remains fully encrypted even at rest.


dataencryption-content-1

Client-side encryption ensures data is protected before transmission

Client-Side Data Encryption is an important component of our “Zero-Knowledge” guarantee. It means our server has “Zero-Knowledge” of what your data is, as it is always encrypted on your device before it comes to us. We never store or have access to plain text data, ensuring total privacy and confidentiality. A significant and core component in the Global Data Sentinel architecture is the Device Sentinel. Running across all platforms including Microsoft Windows, Apple MacOS, Apple IOS, Linux, and Android, Device Sentinel ensures total data security by performing Client-Side Data Encryption and Decryption along with User Authentication.


keyencryption-content-3

Each file is encrypted individually, giving the user full control over access

Wherever your data is stored, on the cloud, on your laptop, on a USB drive, on a backup disk or on someone else’s computer, only you, and those you authorize, can view the contents of those files. Our system will give you complete peace of mind since it will provide you with a level of unmatched security that makes the traditional methods of securing a file system almost irrelevant.

With Global Data Sentinel, each encrypted file is in essence its own file system, with its own permissions and security. These files will always remain impenetrable unless you have expressly granted permission to another person to specifically view that file.


traditionvsGDS