|By PR Newswire||
|July 30, 2014 03:41 AM EDT||
OTTAWA, July 30, 2014 /PRNewswire/ - The Canadian Government's Chief Information Officer confirmed yesterday that Chinese state sponsored hackers have been found to be breaking into the networks of the National Research Council (NRC) - the leading research body for the government. Media reports say that there is concern at the highest levels of the government and that Foreign Minister John Baird met his counterpart in China, and had a comprehensive discussion on the subject.
Wael Aggan, CEO of CloudMask, a Canadian company specializing in data security said that "besides the embarrassment caused, the true damage to national security may never be discovered or fixed. Proactive measures are therefore required to protect data before our opponents hack it. Our defenses have been breached and at least now we need to put strong defensive measures in place".
CloudMask is the winner of the Canadian Innovation Commercialization Program (CICP) and has been evaluated by the Shared Service Canada (SSC), a Canadian Federal Government department, for integration with their security infrastructure. CloudMask had communicated, during the last few months, with the Treasury Board and other Government departments to highlight the threats to the Canadian Cyber infrastructure and to explain CloudMask capabilities in protection of the Federal Government in case of total breach.
Wael Aggan reiterated his company's commitment to Canadian security and said that "this is a real wake up call to protect our assets, our intellectual property and our information in a world where our adversaries can be much stronger than us, I'm sure that this breach represents only the tip of the iceberg. Many breaches could be in progress even at this moment". Wael says "the effect of most breaches that target data are preventable. Earlier this year the "Heartbleed" attack raised alarms when the Canada Revenue Agency was breached. Such attacks are increasing in frequency and are continuing to cause greater damage"
CloudMask solution is based on a "Zero Trust Model'. CloudMask security works with the premise that no one can be trusted with data - including the IT administrators and employees. CloudMask secures data at the very moment of its creation. Strong encryption, tokenization and masking ensure data security even if a hacker has currently broken into your network. CloudMask ensures that all existing applications will continue to function normally with the data it has secured and that data will never travel, process or be stored in clear text.
CloudMask has partnered with companies such as Entrust, SalesForce and Amazon to deliver the best possible security solution without compromising application functionality in any way.
The CloudMask solution is currently going through Common Criteria Certification to meet the security certification required to operate with Governments in 26 Countries.
CloudMask is a Canadian company that offers data protection to secure sensitive data in the Cloud and on premises. Data is protected even in the event of a total breach. Data is kept secure from any hacker, Cloud administrator, Government, and even your own employees and administrators. CloudMask helps you meet data residency and regulations since your private data never leaves the end device and only masked and secured data is stored in the Cloud. The owner of the data is the only one who maintains control of decryption keys and decides who should get access to data.
Elimination of any need for special encryption gateways or VPNs simplifies the deployment process and achieves zero deployment cost and minimizes time to deploy.
CloudMask Videos: www.vimeo.com/cloudmask
SOURCE CloudMask Corp
Image with caption: "CloudMask enables users to protect their confidential data while leveraging public and private cloud applications. (CNW Group/CloudMask Corp)". Image available at: http://photos.newswire.ca/images/download/20140730_C9020_PHOTO_EN_42294.jpg
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Dec. 10, 2016 09:45 AM EST Reads: 604
Dec. 10, 2016 09:30 AM EST Reads: 1,078
Dec. 10, 2016 09:00 AM EST Reads: 1,777
Dec. 10, 2016 08:45 AM EST Reads: 5,476
Dec. 10, 2016 08:30 AM EST Reads: 1,505
Dec. 10, 2016 08:15 AM EST Reads: 1,255
Dec. 10, 2016 07:30 AM EST Reads: 774
Dec. 10, 2016 06:45 AM EST Reads: 550
Dec. 10, 2016 06:00 AM EST Reads: 715
Dec. 10, 2016 04:45 AM EST Reads: 1,106
Dec. 10, 2016 04:30 AM EST Reads: 562
Dec. 10, 2016 04:15 AM EST Reads: 1,392
Dec. 10, 2016 04:15 AM EST Reads: 586
Dec. 10, 2016 04:00 AM EST Reads: 5,320
Dec. 10, 2016 04:00 AM EST Reads: 5,530