Active Cypher: “great deal of orchestration of our intelligence in AI into existing systems” – E Hacking News
Active Cypher: The company is built upon a socially responsible fabric, that provides information security for individuals and corporations in an increasingly complex digital age. The guest speaker for the interview was Mr. Michael Quinn, CEO, and Mr. Caspian Tavallali, COO Active Cypher. Active Cypher’s Ransom Data Guard utilizes a combination of Active Cypher’s proprietary encryption orchestration, smart AI, and advanced endpoint protection.
Your company talked about game-changing software “Ransom Data Guard” that will protect organizations against ransomware threats. Please describe more about it.
The ransomware protection that we provide basically allows us to manage the files in such a way that they are not accessible to external sources like ransomware. We put this product along with our cloud fortress product to make sure that we were meeting compliance regulations. What we found after working with the law firms is we allow the companies to meet compliance through this capability if the product was ransomed or even if it was exfiltrated because we encrypt the data so the actual data itself is useless. On the ransomware side, the beauty of it is we allow a lot of flexibility in how the data can be stored and used.
Besides ransomware protection, what are the other solutions Active Cypher provides?
Let’s say somebody opens a doc. file or they load up a doc. file which has an exploit. How do you handle that?
At a time when hospitals and medical institutions are struggling with Covid-19, how has Active Cypher protected them from ransomware threats?
How do you handle the GDPR (General Data Protection Regulation) and Privacy requirements when it’s the home environment?
With cyberattacks rising, is there any advice you can give to our readers on cybersecurity?
Everybody has to be aware, you don’t have to be afraid. With the stress of work, particularly with this remote work environment, the user has to be more diligent. So, ease of use and awareness are probably the keys to maintaining good data hygiene.