Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:15 AM
Dark Reading
Dark Reading
Products and Releases

ShardSecure Expands Scope of Data Protection with v2.0 Software Release

NEW YORK, March 15, 2021 /PRNewswire/ -- ShardSecure™, the world's most innovative provider of data security and privacy with Microshard™ technology, today announced the release of v2.0. of the ShardSecure Software Appliance. ShardSecure's revolutionary approach to data security uses Microsharding to automatically shred, mix and distribute data to eliminate sensitivity and reduce the attack surface. This latest software update, which includes Amazon S3 API support, integration with Microsoft 365 and structured data support, further extends the protection scope and ease with which ShardSecure can be implemented.

"ShardSecure v2.0 brings functionality and compatibility updates that expand the types of data that can be secured with Microsharding as well the applications with which it integrates," said Tom Noonan, ShardSecure's investor and advisor and former CEO and co-founder of Internet Security Systems (acquired by IBM). "Organizations are able to reduce sensitivity and ensure privacy for a far greater percentage of data, both structured and unstructured, without adding implementation and support time. This latest release significantly expands ShardSecure's addressable market."

Amazon AWS S3 Compatible API

The addition of an AWS S3 Compatible API in ShardSecure v2.0 enables users to treat the ShardSecure cluster like a S3 bucket, to programmatically store and retrieve Microshard data.

  • Allows secure storage from any application that supports S3 Compatible Object Storage as backend storage
  • Ensures easy integration with hundreds of applications, accelerating time-to-value and expanding opportunities to secure data with Microshard technology
  • Deployable on AWS in 15 minutes

Microsoft 365 Integration

Microsoft Online Documents such as PDFs and email often contain an abundance of sensitive data and are notoriously difficult to secure. With Microsoft 365 integration ShardSecure v2.0 ensures data privacy for this vulnerable dataset in a way that is nondisruptive to enterprise workflows.

  • Store sensitive Microsoft Office Online documents in secure, private storage locations in cloud and/or on-prem locations
  • Documents are stored using Microshard technology to eliminate data sensitivity and reduce the impact of data breaches
  • Supports (OneDrive-like) storage of any file type

iSCSI Database Support

Over 40% of cloud databases are not encrypted, as is the case for half of all sensitive data stored in the cloud. ShardSecure now supports Microsharding of structured data for cloud and relational databases.

  • iSCSI support enables any technology to target the ShardSecure appliance just like it would target a virtual storage disk via iSCSI, while distributing that Microshard data to multiple cloud or on-premises storage locations
  • Microshard technology does not slow performance or require extensive key management like encryption for databases
  • Beyond databases, any other solution that supports iSCSI can now easily integrate with ShardSecure

ShardSecure v2.0 also provides automation to AWS and Azure via a new deployment application that brings deployment time down to as little as fifteen minutes. "The expanded protection scope, integration updates and streamlined deployment functionality available in this release enable cybersecurity professionals in industries like technology, financial services and healthcare to ensure data privacy and security for more of their sensitive data than ever before, while further reducing their attack surface and overall compliance burden," said ShardSecure CEO and Co-founder, Bob Lam.

About ShardSecure

Headquartered in New York City, ShardSecure™ is the world's most innovative data security company, disrupting the data privacy and security market with Microshard™ technology – the only solution capable of breaking data into single-digit bytes and distributing across cloud locations without sacrificing performance.

Microsharding provides zero data sensitivity for cloud-stored or on-prem data. Led by veteran cybersecurity entrepreneurs and investors, ShardSecure works with some of the world's most successful companies in healthcare, financial services and technology to ensure ultimate data privacy and compliance, while making data migration to the cloud easier and faster than ever.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-16
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.19), Mendix Applications using Mendix 8 (All versions < V8.17.0), Mendix Applications using Mendix 8 (V8.12) (All versions < V8.12.5), Mendix Applications using Mendix 8 (V8.6) (All versions <...
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user.
PUBLISHED: 2021-04-16
Adobe Genuine Service version 6.6 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An authenticated attacker could exploit this to rewrite the file of the administrator, which may lead to elevated permissions. Exploitation of this issue requires user interaction.
PUBLISHED: 2021-04-16
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.