DataGateKeeper: The FIRST Engineered Anti-Hacking Software
DataGateKeeper: The FIRST Engineered Anti-Hacking Software
DataGateKeeper: First Encryption Software Engineered to Defeat Hacking Programs, Granting Superior Data Protection & Cloud Storage
DataGateKeeper: First Encryption Software Engineered to Defeat Hacking Programs, Granting Superior Data Protection & Cloud Storage Weiterlesen
Presenting the DataGateKeeper Total Data Protection Software™ & SafeDataZone™ Cloud Storage
Flawed Data Security Compromises Your Privacy & Confidentiality
Due to these flaws, cybercriminals and hackers steal and profit from your stored and transmitted personal and business data everyday.
Designed before the turn-of-the-century, AES or Advanced Encryption Standard, is older than most of the cars on the road today, however, it forms the basis of our global data security protection. And its failing.
The unintended consequences of these flaws allows for complete access to your private and confidential data, without your permission, promoting underground data monitoring, data-mining and active eavesdropping. So common is this practice it has a name: Active Snooping.
Today You Have a Choice
With the DataGateKeeper Total Data Protection Software™ and SafeDataZone™ Cloud you can protect your sensitive Tax Records, Financial Statements, Credit Card Statements, Health Statements & Reports, etc., from prying eyes with just One-Click of your Mouse.
Cyber-criminals use any combination of your online data and social engineering to become a digital representation of “You”. Identity theft is on the rise with the FBI calling it the fastest growing criminal enterprise of the 21st century.
Building a Superior Data Security Software & Cloud Storage Solution
The commitment to build a superior data encryption solution, free of outside influence, began nearly 3 years ago. At the same time we were developing the DataGateKeeper (code-named Deterrence), unfortunately, over 150 million personal and confidential files were compromised, stolen or hacked in the U.S. alone. And those were just the ones that were reported.
To accomplish our goal, first had to be able beat hackers at their own game, using their own tools. To do this, we reverse engineered several commercially available automated password cracking programs to understand these programs methodologies.
Our Pledge To Serve Those Who Protect Us
As a thank you to you and the Kickstarter community for supporting us, for every reward pledge we receive for our DataGateKeeper software during this campaign. We will award a complimentary lifetime subscription of our 768-bit First Responder DataGateKeeper Software including 500GB of our SafeDataZone in your name to one of the organizations listed in our post campaign survey, tending to the people who protect our lives and our liberty. They should not have to worry about data theft when their mission is far greater.
DataGateKeeper™ — Outclassing the Market on Price & Security
Why settle for inferior data protection and Cloud storage?
The chart below compares the highest MSRP of our DataGateKeeper Total Data Protection Software™ & integrated SafeDataZone™ versus the competitors lowest available published price, and security solution, for data ‘at-rest’ and ‘in-motion’. Not one competitor offers 512-bit plan that is like or similar to the DataGateKeeper.
You Deserve Better.
DataGateKeeper Software Integrates into Other Cloud Providers
If you have already paid your annual subscription for "one of the other guys", don't fret, the DataGateKeeper fully integrates to those platforms so you can protect your private and confidential files with our powerful data security software.
Our 64GB Flashdrive
Our limited edition 64GB 3.0 USB flashdrive comes with the DataGateKeeper™ software pre-installed. Oh... and it is hardened and waterproofed up to 100 meters!
Now you can have the ultimate in convenience and data security. Use the DataGateKeeper solely on the USB, all encryption and decryption can be performed on the flashdrive using the DataGateKeeper browser. When you eject the USB you take your secured files with you anywhere. If you travel this is a wonderful solution for making sure your documents are always secure. When using the hotel computer to print out your flight itinerary pop in your DataGateKeeper Flashdrive, print from the your secure DataGateKeeper browser, eject and your footprint is virtually eliminated.
The Building of an Superior Data Security Solution & Cloud
Our goal was to purposefully design and engineer an easy to use, mathematically superior data protection solution where users could control the security of their data, at point-of-use, on their device, prior to transmission or storage.
The R&D Plan
To build the DataGateKeeper, we disassembled and reverse engineered several automated password cracking software programs. This was to understand their procedural sequence and methodologies related to code acquisition, code cracking, or as it is known, hashed access to code and source. Additionally, we decompiled these programs to gain insight on hacking software's proclivity to exploit weakness in cycle rates, including their integrated and powerful automation multipliers, and natural GPU processor affinity. Following months research we had what we needed to protect you.
FIPS Validation Plan
Now that our DataGateKeeper cryptographic module is complete, we plan to submit our module for independent validation the sooner of; official final publication of the NIST pronouncement on the Federal Register seeking comment to portions of 19790 (deemed 19790:2014), to update 140-2, or, the official abandonment of such update. We plan to use Underwriters Laboratory (UL), however, there are several other certified laboratories performing FIPS certification. Following validation and patent (currently we rely on trade secret to protect our algorithm) we will release our algorithm to select members of the cryptographic community for further development and analysis under a very specific set of guidelines which we will solely determine.
We have no plans to release any portion or portions of our code as Open Source. Those of you in the software community who are Open Source advocates are welcome to invest your time, effort and capital to develop a competitive data security solution and release it as Open Source...we encourage it. Go get em champs.
Vulnerability Coordination & Bug Bounty Platform
We are currently coordinating efforts to provide the DataGateKeeper, under strict guidelines, to one or more vulnerability coordination platforms, such as Hackerone. Our plan includes inviting predetermined, preselected software testers to leverage their skills and creativity to undertake periodic reviews of our data security solution to inspect for vulnerabilities and assist us with future updates. We will use this form of Bug Bounty Platform to provide independent testers a forum to aid us in future developments and testing before updates are published.
Complete the stress testing and subscriber (license) verification call-backs, which includes obfuscation of our DataGateKeeper code for Windows, Android and Apple platforms. Clearly, we would not release our software absent robust licensing controls and obfuscation, given the community we are targeting to put out of business.
The DataGateKeeper Total Data Protection Software™ is materially complete absent the above licensing call-backs, obfuscation and stress testing.
B2B Solution: FIPS Validation of our cryptographic module for the SMB market.
We anticipate market sensitivity to FIPS validation for the Small and Medium Business (SMB), and enterprise sector. While we have a unique 'permission based solution' for these sectors, prior to making the DataGateKeeper Total Data Protection Software™ and SafeDataZone™ available, we will submit our cryptographic module to independent validation as described in our FIPS Validation Plan above.
We believe the B2B market is an important market to target for the DataGateKeeper cybersecurity solution, given the continued and growing failures of current data security protocols, methods and procedures. We believe current data security and its patchwork of mitigation patches and updates has reached functional obsolescence, however, failed and stale dogma still is the predicate in this sector. The B2B cybersecurity market spends billions of dollars in post breach analysis, akin to closing the barn door after the horse has left the barn.
Once our cryptographic module (Deterrence_V1.1) completes validation, we will look to develop a market in this sector for the DataGateKeeper Total Data Protection Software™ and SafeDataZone™. Additionally, we will look to partner and/or license our cybersecurity solution for submission to the Federal Risk and Authorization Management Program (FedRAMP®) as a compliant solution.
Choose the the DataGateKeeper Total Data Protection Software™.
Risiken und Herausforderungen
Our management team is uniquely qualified to implement our plan of operations, with a combined 75+ years of entrepreneurial experience, at all levels of corporate gestation, from rank start-up through to publicly traded entities. Our experience spans multiple sectors, from entertainment and manufacturing to healthcare and technology.
Certainly, there are outside Risks and Challenges we are focused on, such as managing third party software, hardware suppliers, and third party manufactures of our flash drives. Management, has, “been there done that”, as the saying goes. As a result, we have well thought out contingencies, and standard operating procedures (SOP) in place to deal with each issue.
Our team spent the last two and half years working on Deterrence, renamed DataGateKeeper Total Data Protection Software™ for marketing and copyright. Our solution is in final testing and coding, and while there are measurable stages ahead of us, we are confident, once launched, our cybersecurity solution, the DataGateKeeper Total Data Protection Software™ and SafeDataZone™ will be the most robust, easy to use, cybersecurity solution available on the market for Civilians and Small & Medium Business alike to secure their Privacy, Confidentiality, intellectual property and sensitive information.
- (30 Tage)