SERVICE / SOLUTION

StrongKey“Tellaro”(5-Tellaro)

  • Systena Original Services

Data gets stolen. Protect it with encryption! Introducing a New Security System

In today’s world where all information is managed with IT, the risk of data leaks are so great that they could spell ruin for a company. Even now, in fact, hackers are continuing to steal large amounts of confidential and personal information. The current wisdom that “we’ll be fine as long as we firmly shut the entrance with a firewall” is no longer sufficient as a measure to prevent information leaks.
Tellaro from StrongKey is a highly trusted product that has been adopted by many central banks, military organizations and Fortune 500 companies in North America, Europe and around the world. What’s more, organizations can easily get started with Tellaro for less than similar products from other major vendors.
Recent information leaks have shown hackers and corporations locked in a game of cat and mouse to employ the latest technical advancements. This, combined with the ever-present risk of human error, makes it impossible to prevent leaks outright.
StrongKey uses FIDO2, a simple and safe login authentication solution that does not use passwords, and encrypts your files so that even if the data itself is stolen, without the “key” it will appear as unreadable, meaningless symbols, allowing you to protect important information. In addition, electronic signatures let you identify who stole or tampered with data, and when.
Systena provides one-stop support to help customers incorporate the latest information security products with a proven global track record into their existing environments.

StrongKey is a U.S.-based Group company of Systena.

For customers who:

  • Are unsure of how to respond to security risks
  • Are worried that their existing security measures are based on outdated technologies
  • Find it difficult to install a major encryption software product because it is large and expensive
  • Have confidential information stored internally but haven’t properly managed it through measures such as encryption
  • Want to introduce simple yet robust system authentication due to concerns over password management that is dependent on individuals

Service Features

Three-layer encryption and proper encryption key management

Tellaro from StrongKey encrypts data at three levels, files, data and disks, and performs encryption and decryption at the application layer, making it easy to deploy in existing systems. Since Tellaro also ensures that only authorized applications can decrypt information by way of an encryption key, the design is also resilient to system tampering.
The keys used for encryption are saved to an HSM or TPM, which are specialized hardware that manages all keys, and since the keys are only used inside the HSM/TPM hardware, no information is leaked outside.
For self-encrypting drives (SED), device management and passphrase saving features are provided.

Tokenization

Tokenization is a mechanism that encrypts confidential information such as a passphrase or credit card number, securely stores the information, and returns a “token” that serves as a receipt that can be exchanged for the actual data.
As the token itself contains no confidential information, there is no risk of that information being deciphered if it is leaked. Additionally, since each token is guaranteed to be unique, processes that until now have used a card number as a key can replace it with a token without having to make changes to the system.

Electronic Authentication

Through electronic authentication, we can determine who stole or tampered with data, how and when.
In addition to protecting against hackers, this also allows you to prevent human error and internal damage.

FIDO2 Authentication

FIDO2 authentication lets you eliminate passwords from system authentication with the use of biometric authentication such as fingerprints, smartphone-based authentication and the use of tokens. Since no passwords are used, damages from hacking due to passwords being leaked or deciphered can be prevented.
As well as freeing employees and customers from the hassle of remembering and periodically changing passwords, this makes the system safer.

Service Details

  • Product Specifications

    Tellaro E1000 H(HSM) 1,000 transactions per second, FIPS 140-2 Level 3
    Tellaro E1000 T(TPM2) 1,000 transactions per second, FIPS 140-2 Level 2
    Tellaro T100(TPM2) 100 transactions per second, FIPS 140-2 Level 2
  • Typical Introduction Scenario

    Tellaro provides a powerful authentication and encryption system using HSM/TPM2. HSM/TPM2 is the hardware for safely storing and using keys, the most important element of security. It is highly resistant to tampering and stops key information from getting outside throughout the key lifecycle (generation, storage and disposal). Even during signing and encryption, confidential keys are only used inside the HSM/TPM2 hardware.

  • Related Articles

  • Related sites