StoredSafe

StoredSafe Products

All our products are based on StoredSafe Secure Platform. Our security platform gives you: Strong encryption, Role Based Access Control, a full audit trail and two Factor Authentication. See more details under Platform

StoredSafe provides the following key solutions

Store your passwords

Password StoredSafe

Most organizations today are facing a challenge with critical passwords and encryption keys. The necessity to share certain accounts password within an organization with the challenge to provide full audit trails, are currently in conflict with basic compliance requirements and common security practices.

The primary objective of Password StoredSafe is to securely store and share passwords as well as other critical information related to your passwords on a “real” need to know basis with a full audit trail. Our solution ensures that even the system administrators have no access to the critical information and the Information owner owns the master encryption key – The information owner remains in control!

Password StoredSafe enables you to securely store, ensure and prove that passwords, encryption keys, pin codes and passphrases are known to and restricted to only authorized personnel. Furthermore it provides critical information such as who has seen what password and when, password last changed, password strengths, etc.

Encryption of files

File StoredSafe

File StoredSafe ensures the confidentiality of your most business critical information.

File StoredSafe enables you to assure and prove that your information is restricted, only accessed by authorized personnel and provides data of who has seen what information and when. You are also able to share this information in a fully controlled manner to external individuals. Not even your system administrators will be able to read your encrypted information. The information owner remains in control!

File StoredSafe is used by our customers to store highly confidential data such as:

  • Intellectual Property (patents, code, recipes, product development, etc.)
  • Financial Reporting (before publishing date)
  • Due Diligence Information
  • Critical IT-Infrastructure Documentation
  • Merger and Acquisition Information
  • Internal/External Investigations
  • Critical Back-ups (HSM’s, encryption keys etc.)

File StoredSafe enables you to assure and prove that your information is accessed only by authorized personnel and provides data of who has seen what information and when. You are also able to share this information in a fully controlled manner to specified external individuals without fuzz. Not even your system administrator with root access will be able to read your encrypted information.

Making it easy for you

Two Factor Authentication StoredSafe

2FA StoredSafe – Two Factor Authentication Made Easy.

Our turnkey appliance enables your organization to implement two factor authentication to various information sources. Two Factor Authentication StoredSafe makes a 2FA implementation a breeze and add a second layer of security to your existing IT infrastructure. Our highly recommended solution for easy roll-out and low cost lifecycle management of two factor authentication tokens is YubiKeys from Yubico.

Example of common Two Factor Authentication StoredSafe Implementations:

  • Adding 2FA to current VPN solution
  • Adding 2FA for Network Equipment
  • Adding 2FA to critical applications
  • Adding 2FA to Unix/Linux and Windows Servers

The primary goal of Two Factor Authentication StoredSafe is to strengthen an existing authentication mechanism such as AD/LDAP or another RADIUS by adding the second factor authentication (currently YubiKeys and Google Authenticator). Our solution integrates easy with current IT infrastructure without any major redesigns.

Auto Provisioning:

To enable ease administration, Auto Provisioning glues the username of a successfully authenticated user together with the yubico id of a validated OTP. This only occurs the first time the user authenticates. Next time the user is associated with his/her YubiKey id.

There is also support for doing OTP-bypass if you have service accounts that cannot handle OTP, such as RANCID, Tuffin, etc.

Two Factor Authentication StoredSafe will forward the original IP-address of the client as a Calling-Station-ID and will also proxy back attributes set by another authentication (RADIUS) server.

Feel secure about risk

Certificate StoredSafe

Public Key infrastructure (PKI) is a critical security enabler. However, faulty configurations and poor control, pose a major risk. Most organizations today rely on several different PKI components and vendors to achieve and secure inter-system data transfer, cross organizational communication, client logon and system access.

Certificate StoredSafe enables you to securely store, ensure and prove that certificates and related information are known to and restricted to only authorized personnel. Furthermore it provides critical information such as who has seen what certificate key passphrase, certificate last changed, certificate expirations, etc.

Certificate StoredSafe will reduce your risk significantly as well as improving your incident response capability by raising your control level, helping you monitor, alert and respond to operational risks posed by any certificate in you environment without vendor specific limitations.

Example of usage of your one stop shop for certificate information:

  • Store and administrate your private keys and passphrases
  • Store and administrate your public keys
  • Store and administer certificate meta data (inception date, expiration date, usage, etc.)
  • Dynamic triggering and alerts for upcoming expiration dates and hosts needing renewed certificates.

StoredSafe audit engine will maintain a chain of custody for your certificate artifacts.

This product is the one storing certificate signing requests, certificates, certificate key files and confidential information related to your PKI-Infrastructure.