With over 4000 security instances as per NIST 800-53-5, our Active Data Vaults are comprehensively secure. In fact, ADV exceeds NIST standards via 3 key features:
Moving Target Defense – Our ephemeral networks are designed to be deprovisioned in a single click. In doing so, data is saved in secure storage or in a concurrent infrastructure, and then utilized once again in a brand new, and thus totally clean, network. This counters advanced persistent threats while also potentially reducing expense since cloud costs are only incurred when the infrastructure is running.
Confidential Computing – Incumbent technologies encrypt data at rest and in transit. We achieve these table stakes while also encrypting data in use, such as when running analytics, AI, or ML. This strong encryption counters memory unsafety and kernel vulnerabilities. It further counters insider threat since data is accessible to authorized workloads, yet unreadable to platform administrators, hypervisors, data scientists, data engineers, and even threat from cloud service providers who have physical access to the machines.
Quantum Hardened – ADV is engineered to meet post-quantum standards as set forth by FIPS 140-2 Level 3 and thus counters SNDL threats. Further, it is designed to be easily upgraded in hours if emergent encryption methods are developed & required by customers.
ADV has many possible use cases, so having an opportunity to inquire about relevant problems & challenges is ideal. That said, below are a few possible implementations:
For example: special access programs, defense in depth, and zero trust.
For example: coalition, interservice, or interagency.
For example: any application or tool you regularly use, but now encrypted in use.
Common Alternative – VectorZero is the only US-owned US-operated company that we know of with the above capabilities. Many defense organizations currently use homomorphic encryption (HE) as a current alternative. A study by NIST showed that HE systems are 10^6 to 10^7 (10 million) times slower than traditional encryption systems. Furthermore, as post-quantum encryption emerges, HE may face additional challenges in adapting to evolving algorithms and cryptographic techniques.