Welcome!

News Feed Item

BitSpray® - The Last Line of Defense

Data-Level Protection When All Else Fails

CANTON, Miss., Aug. 12, 2015 /PRNewswire-iReach/ -- After hackers blow through the concrete and Kevlar walls of a datacenter, jump over mile-high firewalls, slither under a legion of tripwires and intrusion detectors, slaughter IPsec, TLS, SSH and everything else blocking their way, and they finally burst into the Queen's Chamber where the crown jewels are stored, what do you think they find? Well, if the jewels are protected using conventional cyber-wisdom, they find and carry off neat little bundles of complete information—crown jewels by any other name.No big deal, you say with a sneer—it's all encrypted;-)

Photo - http://photos.prnewswire.com/prnh/20150811/257616

Oh really? With all the successful hackings reported today, not to mention those that go unreported, it is time to stop pretending our conventional cyber-defenses are safe and grudgingly admit three things:

1) We can't stop hackers from breaking into our datacenters; we can only keep them at bay

2) When they do break in they will carry off neat little bundles of complete information, and

3) The encryption protecting those bundles will be cracked; it's just a matter of time and horsepower

The Chinese Tianhe-2 supercomputer runs at 33.86 petaflops; that's 33.86 quadrillion floating point operations per second. So how long do you think it would take that behemoth to crack a 48-byte password and initialization vector (NIST standard AES-256 encryption)?  "No time at all" is the correct answer, even without help from rainbow tables and globally shared hacking tools freely flowing over the internet today. And hey, if one Tianhe won't do the trick, they can always cluster a few together and really have some fun—time and horsepower.

So how do we stop this madness and win WW-III? The answer is stop solely relying on time-honored best practices solutions (a.k.a. more of the same). It is time to get down and dirty and practice irregular asymmetric cyber-warfare. To win this war we need to radically change the Rules of Engagement.

BitSpray® is a game-changer technology that entirely removes complete information from the equation. It also removes users from the equation. Hackers can't access what they can't find, and they can't steal what isn't there. BitSpray Advanced Data Dispersion Technology™ (ADDT™) is the last line of defense. It is a whole new battle hackers never had to fight before. After hackers defeat everything conventional cyber-wisdom can throw at them, they encounter the BitSpray share volume and the power of the Data Shell Game™. BitSpray mathematically disassembles information into incomplete subsets of "data primitives." Then it sprays that slurry out to multiple geographically separate storage locations in such a manner that no compete dataset ever travels over a single network path, nor is a complete dataset ever stored in a single location. BitSpray is a patented ultra-secure, ultra-persistent, computer-to-computer, cryptographic, communication network technology that forces hackers to break into multiple datacenters in order to find enough share volumes to reassemble an original file. Then the Data Shell Game forces them to hunt through a labyrinth built from zillions of bundles of bit-soup that all look alike, inside and out. And even if a group of crafty hackers do accomplish this seemingly impossible feat, that's where the real battle begins. Then they have to cut through all the FIPS-compliant and proprietary BitSpray crypto-juju protecting those volumes. Better pack a lunch for that, and don't forget to include a few energy bars because they also have to reverse-engineer the BitSpray software, which won't be a cakewalk since it is deployed as a virtual thin client.

Conventional cyber-wisdom protects networks; BitSpray does not. Instead, It empowers data to protect itself. It is a com­plete client-based, data-level, information protection system for data-in-motion and data-at-rest that has the power to thwart Chinese hackers and WikiLeaks contributors with a single low-cost solution. It works on or off the cloud and can be custom-designed to create hybrid environments. When the teachings of the BitSpray patent art are practiced, it becomes a near-impossibility for data transmitted and stored in a BitSpray network to ever be lost, stolen, vandalized, hacked or cracked. Information is ever present and always available. Intru­sions like man-in-the-middle attacks and denial of service attacks become exercises in futility, and natural and manmade disasters have little to no effect. There is a 3-minute video entitled How BitSpray Works at:  www.bitspray.com.

— BitSpray has the potential to become the standard model for securely storing, sharing, and transmit­ting data in the 21st Century. We are actively seeking qualified people who can make that a reality.

About BitSpray Advanced Data Dispersion Technology (ADDT): On March 18, 2009, during a business meeting in Washington, DC, Walt Runkis had a vision of the BitSpray Network. It wasn't the complete image, only the trunk and parts of a foot and ear of an elephant coming out of the fog. He filed a provisional patent application in May. The regular application was filed a year later by DLA Piper (world's most prestigious intellectual property firm) and issued April 15, 2014 (8,700,890). Piper also filed two additional ADDT-related applications. ADDT now comprises seven major inventions, plus a number of supporting inventions and trade secrets. The major seven are: BitSpray® ADDT (core tech­nology), Data Shell Game™, BitSpray Over Powerline (BoP™), Globally Dispersed Virtual Data­center™ (GDVD™), BitSprayOTF™, Dispersed Digital Rights Management (DDRM™), and BitSprayMail™.

About Walt Runkis, Chairman and CEO/CTO at BitSpray Corporation: Walt is a true Renaissance man: scientist, inventor, artist, published author and serial entrepreneur. He has two patents in the fields of immuno-chemistry and cellular nutrition. In addition, he has one patent issued, one allowed, plus two pending in the field of network cybersecurity. His eclectic technical background includes the disciplines of real-time telemetry and control programming, software applica­tion development, broadband over powerline architecture, video-on-demand streaming, and dispersed cryptographic network architecture (a discipline he invented). Walt was a decorated Sergeant E-5 in the US Marine Corps and served in Vietnam from June 1965 to July 1966 as a Marine ASRaT.

Media Contact: Bert Massey, BitSpray Corporation, 601-201-3121, [email protected]

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

SOURCE BitSpray Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.