AnyData. AnyApp. AnyWhere.

 

AnyData.

 

Regardless of what data you want to protect - personal data, medical data, financial data - with data-centric protection, your data is safe from unauthorized individuals. At the same time, the information remains available to users, thanks to stateless key management and your existing authorizations concept.

 

AnyApp.

 

We can protect data in any application without restricting processes or usability. The underlying data in the systems is encrypted in a format-preserving manner. Data is kept protected from all unauthorized use.

 

AnyWhere.

 

Whether you store and process your data on-premise or at a cloud service provider is irrelevant for data-centric protection. With format-preserving encryption, i.e., encryption and separate access management, you always remain in control of your data, even if you do not have physical access to the IT infrastructure.

9 Benefits of data-centric protection

The world of data is becoming more complex every day. Prewen accepted the challenge and offered a comprehensive solution with a revolutionary approach. While most IT security solutions start with the IT infrastructure, Prewen focuses on protecting the data. The concept strikes through simplicity: The information is encrypted so that it cannot be read by unauthorized access. They are utterly useless for data theft or in the event of a data leak. Combined with stateless key management, your data is safer than ever!


  • Nº1 · Format-preserving encryption

    Your data is fully protected. Nevertheless, your protected data retains its format and data structure within the application.

  • Nº2 · Stateless key-management

    Keys are generated just in time - eliminating the need for key storage and backup/restore.

  • Nº3 · Scaleability & Flexibility

    We are connecting new technologies and applications without decrypting the data.

  • Nº4 · Cloud migration

    You migrate your applications and data into the cloud while your data is secure at any time.

  • Nº5 · Hackers with no chance

    Professional hackers often commit data theft. We protect data from misuse.

  • Nº6 · Minimized risks

    The risk of high costs or reputational damage due to data loss is eliminated.

  • Nº7 · Comply with industry standards

    Be it for FINMA guidelines, PCI DSS, compliance with data protection laws, or DSGVO guidelines.

  • Nº8 · Analytics & Automation

    All data is available for automated processing, reporting, and ongoing data analysis.

  • Nº9 · Less complexity

    Data encrypted at the core reduces the complexity of your IT infrastructure while providing complete protection.

Data Security: Engage now!

 

It is fair to say that data-centric protection with format-preserving encryption is a paradigm shift in state-of-the-art data security. Although IT landscapes have changed significantly in recent years, many companies still rely on security mechanisms from the past and struggle to keep up with evolving requirements and greater complexity. In practice, an unstoppable trend is emerging: more and more companies rely on the data-centric approach - with success.

Cyber Risk Hotspots

«Really, I don't understand why everyone in the world hasn't gone to this form of encryption,» Carr said. «The data is of no value to the bad guys.»

Robert Carr CEO, Heartland Payment Systems

Answers to the most important questions.

 
  • The topic of cyber security is currently on everyone's mind. Almost every day there are reports of cyber attacks that gain criminal access in ever new and diverse ways. The data security solutions to protect against these attacks are just as varied. Prewen's data security approach focuses on format-preserving encryption with data-centric security. This prevents stolen data from being read or misused.

  • Data misuse is the misuse of illegally acquired data. The data may have been stolen either by hacker attacks or by internal or external personnel with access.

    Most often, data theft is not recognized. If money were stolen, the money is gone. However, in the case of data theft, the data is still there because data has simply been copied and can be misused without the original «owner» of the data noticing.

    Prewen offers a complete solution for the prevention of data misuse.

  • With the same solutions that protect data from misuse, compliance with data protection laws and other regulatory requirements regarding the protection of specific data can also be ensured through pseudonymization or anonymization. Examples are data protection laws such as the EU General Data Protection Regulation (EU-DSGVO) or the Swiss Data Protection Law (CH-DSG). In some cases, laws from other countries also directly contradict local laws, such as the US CLOUD Act.

  • Payment Card Industry Data Security Standard - the security standard in the financial industry. Companies with systems that contain credit card data are audited annually. These audits are time-consuming and very expensive for the companies. By tokenizing credit card data, systems that only work with the protected data are removed from the audit scope. This makes the audits leaner, significantly cheaper and the data more secure at the same time.

  • Anonymization:
    Anonymization changes data elements in such a way that these data are replaced by other values. The assignment to the original data can no longer be reversed.

    Pseudonymization:
    With pseudonymization, the data elements (surname, first name, illness, bank account, ...) are replaced by pseudonyms. If one has the appropriate authorization, the data can be restored in (plain text).

    For both measures, various methods exist for protecting the data, including encryption, hashing, tokenization, and so forth.

Ready for the ultimate Prewention? 

Prewen's data security experts will be happy to advise you on a data-centric security solution tailored to your application and needs. Finally, you have your data risks under control and can concentrate on the business because Prewen will ensure: Relax. Your data is safe.