Welcome!

News Feed Item

Canadian Technology Company offers Canadian Government a solution to protect against Foreign Government Sponsored Attacks

OTTAWA, July 30, 2014 /PRNewswire/ - The Canadian Government's Chief Information Officer confirmed yesterday that Chinese state sponsored hackers have been found to be breaking into the networks of the National Research Council (NRC) - the leading research body for the government. Media reports say that there is concern at the highest levels of the government and that Foreign Minister John Baird met his counterpart in China, and had a comprehensive discussion on the subject.

Wael Aggan, CEO of CloudMask, a Canadian company specializing in data security said that "besides the embarrassment caused, the true damage to national security may never be discovered or fixed. Proactive measures are therefore required to protect data before our opponents hack it. Our defenses have been breached and at least now we need to put strong defensive measures in place".

CloudMask is the winner of the Canadian Innovation Commercialization Program (CICP) and has been evaluated by the Shared Service Canada (SSC), a Canadian Federal Government department, for integration with their security infrastructure. CloudMask had communicated, during the last few months, with the Treasury Board and other Government departments to highlight the threats to the Canadian Cyber infrastructure and to explain CloudMask capabilities in protection of the Federal Government in case of total breach.

Wael Aggan reiterated his company's commitment to Canadian security and said that "this is a real wake up call to protect our assets, our intellectual property and our information in a world where our adversaries can be much stronger than us, I'm sure that this breach represents only the tip of the iceberg. Many breaches could be in progress even at this moment". Wael says "the effect of most breaches that target data are preventable.  Earlier this year the "Heartbleed" attack raised alarms when the Canada Revenue Agency was breached. Such attacks are increasing in frequency and are continuing to cause greater damage"

CloudMask solution is based on a "Zero Trust Model'. CloudMask security works with the premise that no one can be trusted with data - including the IT administrators and employees. CloudMask secures data at the very moment of its creation. Strong encryption, tokenization and masking ensure data security even if a hacker has currently broken into your network. CloudMask ensures that all existing applications will continue to function normally with the data it has secured and that data will never travel, process or be stored in clear text.

CloudMask has partnered with companies such as Entrust, SalesForce and Amazon to deliver the best possible security solution without compromising application functionality in any way.

The CloudMask solution is currently going through Common Criteria Certification to meet the security certification required to operate with Governments in 26 Countries.

About CloudMask

CloudMask is a Canadian company that offers data protection to secure sensitive data in the Cloud and on premises. Data is protected even in the event of a total breach. Data is kept secure from any hacker, Cloud administrator, Government, and even your own employees and administrators. CloudMask helps you meet data residency and regulations since your private data never leaves the end device and only masked and secured data is stored in the Cloud. The owner of the data is the only one who maintains control of decryption keys and decides who should get access to data.

Elimination of any need for special encryption gateways or VPNs simplifies the deployment process and achieves zero deployment cost and minimizes time to deploy.

CloudMask Videos: www.vimeo.com/cloudmask

SOURCE CloudMask Corp

Image with caption: "CloudMask enables users to protect their confidential data while leveraging public and private cloud applications. (CNW Group/CloudMask Corp)". Image available at: http://photos.newswire.ca/images/download/20140730_C9020_PHOTO_EN_42294.jpg

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...