Solutions

SplitByte offers both a desktop client and a web application for organizations to identify and split their data using the specifications (m, n, and the stream cipher). Splitting occurs right at the edge, providing complete security when splits are being transmitted over the network bandwidth. The data can be retrieved by the same user or another user with designated access and permission. Retrieval also occurs right at the client.

AI Powered

 If during retrieval, the threshold quorum of shares are not accessed in a a specified time frame, SplitByte alerts the client of a suspicious activity.

The application will also provide daily logs for each split share location.

Data Aging and Lifecycle Management
Data Privacy Compliance (Using Ombudsman /Custodian)
Sensitive Data Sharing
Sensitive Data Escrow
Resilient Platform against Ransomware
Embedded in "Security by Design" Apps

Target Sectors

FAQ

SplitByte complements and layers on top of AES as an additional layer of defense. It’s keyless approach to security, along with inherent redundancy and fault tolerance avoid any single point of failure.

The splits can be stored on either NAS locations, local hard drives, AWS, S3, Azure, Google or other public cloud platforms. Servers can be hosted or owned by the client, SplitByte or a third party company.

All unstructured and semi-structured data can be protected using SplitByte. This includes data types such as PDF, DOC, DOCX, XLS, picture formats, audio files, video files and beyond. 

SplitByte supports all file systems such as SAN, NAS, and Azure Storage. Integrations with Google Drive, Sharepoint, MS Teams, Slack and Box are currently being developed and will be available soon.

The current product supports a Windows desktop client and a web based application which can be accessed via URL.

SplitByte’s added protection and security comes with a small storage overhead. Because the data is read from multiple splits,  retrieval is actually faster as it would be with a traditional RAID array.

SplitByte integrates with the different data sources using REST API calls to pull data in for processing while maintaining the integrity of the data at source. SplitByte also offers an option to delete data at the source at the time of ingestion.

Even though data is split into several pieces, the storage overhead is not equivalent to the number of pieces. Total overhead differs from case to case, and depends on the total number of splits as well as the threshold retrieval number.

SplitByte is designed to store petabytes of data without losing any data integrity while seamlessly integrating with various data sources and cloud providers.

Data Aging and Lifecycle Management (Dark Data, Rarely Used Data)

Company X, one of the leading asset management company in North America, has records of old customers dating back to several years. Most of the data is redundant, obsolete, and trivial (ROT data) and is rarely used or touched. Company X stores this data either on prem in their data centres or in the public cloud storage of Azure/AWS. These data centres are difficult and costly to manage and are vulnerable to various attacks. SplitByte provides a unique solution to securely store this data by splitting and storing it on various public clouds, or with escrow or managed service providers. This not only reduces the attack surface but also reduces the storage overhead as compared to a traditional backup system.

Data Privacy Compliance (Using Ombudsman /Custodian)

In compliance with the new GDPR and CCPA laws, company X, a one stop home delivery solution, needs to make sure it is capable on deleting the users data on demand. Whereas, company X also has to keep this old data for a potential lawsuit that might arise in the future. In order to resolve the paradox, SplitByte can help company X by digitally burying the data on public clouds or with some escrow providers making sure that no single entity has the threshold quorum of data. Data can only be exhumed using a smart contract in presence of an ombudsman. Thus, company X made sure it complied with GDPR/CCPA rules and also with any jurisdiction compliance. This method also gave the power for company X to retrieve the data un case of exigencies which are pre decided.

Sensitive Data Sharing (Deal Rooms for Due Diligence, JVs, Earnings Reports, etc)

Company X, a leading pharmaceutical company, is just about to go IPO. There are a lot of information being shared amongst the CXO’s such as Earnings reports, cap table, budgeting etc. Currently, the only way of sharing such information is using emails or chat rooms. Such exchange of information is not secure and are constantly under threat of attacks. SplitByte provide an unique solution by providing an end user client to securely share such sensitive and confidential information. The splitting and retrieval occurs right at the edge thus only splits are shared over the SSL/TLS channel.

Sensitive Data Escrow (Digilocker, Greenbox, Estate Planning Vault, Source Code)

Sensitive Data Escrow providers such as Digilocker, Greenbox, Estate, Vaults for Estate planning, source code house tons of sensitive data and IP related information. These are mostly stored in a central repository with little or no protection. SplitByte can securely store this information by splitting and storing the data in multiple geo dispersed locations.

Resilient Platform against Ransomware

SplitByte provides a resilient solution against DDOS attacks like Ransomware. Splitting the data and storing it in multiple locations prevents from single point of failure. If there is a ransomware attack on one of the split locations, data can still be retrieved back, and another instance of the share location can be spun up. Also, if the end user’s edge device is under attack but the data was already protected using SplitByte, users do not have succumb to the attacker’s demand.

Embedded in "Security by Design" Apps

SplitByte can be incorporated in “Security by Design” Apps like Microsoft 365 E Series, Coinbase Key Mgmt, SalesForce CRM, FB/WhatsApp archive. All secure information soted, communications shared will now be secure due to SplitByte’s split and store technology and the fact that each piece gives out zero information about the actual data.