Products

Powerful. Flexible. Scaleable.

Less time to market.

Less


Validian’s first-to-market Confidential Computing Software, ValidianProtect, is a powerful, flexible, scaleable and rapidly integrated cyber security middleware. It quickly builds, deploys and manages Trusted Distributed Applications on centralized or decentralized networks. This seals the application and the data within, protecting it from threats.

ValidianProtect(TM) product line

The Application & Data Protection Platform protects against network-borne vulnerabilities such as intrusion, impersonation and interception. You can rapidly integrate it into new or existing applications and race to market. Then, change the way you protect yourself on the fly.

The Data Protection Module protects against host-borne vulnerabilities such as memory-scanning and file system scanning. It also provides ready-built capabilities such as flexible control over usage and retraction of data. It offers immediate alerts on the permitted usage, and on the attempted prohibited usage of data.

The Confidential Application Tool Kit comprising a set of programming tools and Software Development Kits (SDKs) that integrate the platform and module within the target application. You can build quickly and with confidence using a robust and competitive set of features and capabilities.


About ValidianProtect (TM)

With ValidianProtect, many new applications can be protected or existing applications extended easily and intuitively:

  • web applications
  • mobile applications
  • local applications
  • network applications
  • legacy client/server applications
  • fully distributed business and industrial applications

These applications can then be deployed on either a cloud, on-premises or hosted basis with the level of protection controlled dynamically by administrators.

Each Validian-enabled, Trusted Application has an unlimited number of virtual closed systems, termed “Realms”, which encompass and seamlessly protect the application and the complete life cycle of data. Data is encrypted and secured within these realms in each of its states:

  1. data in memory
  2. data at rest
  3. data in use
  4. data in transit

Data is protected in several forms of usage, for example:

  1. creation, opening and reading
  2. copying
  3. saving
  4. editing and manipulation
  5. forwarding or exporting

This ensures data is never exposed. It protects the confidentiality and integrity of data against threats like:

  • improper access
  • theft
  • unauthorized duplication
  • unwanted distribution
  • device, network or system vulnerabilities
  • viruses
  • malware
  • other known and unknown threats

PDF Resource


Competitive snapshot

FeaturesValidian
Protect
SSL/ TLS PGP
PKI
FirewallsIntrusion
& Threat
Detection
Anti
Virus &
Anti-
Malware
Application
Authentication
undefinedundefinedundefinedundefinedundefined
Secure
data usage
undefinedundefinedundefinedundefinedundefined
Encrypted
memory
undefinedundefinedundefinedundefinedundefined
Enhanced
message and
content controls
undefinedundefinedundefinedundefinedundefined
End-to-end
encryption
for data
transport
undefinedundefinedundefinedundefinedundefined
Secure
Storage
undefinedundefinedundefinedundefinedundefined
Dynamically
Changing
Encryption
Algorithms
undefinedundefinedundefinedundefinedundefined
Dynamically
Changing
Symmetrical
Key Encryption
undefinedundefinedundefinedundefinedundefined
Seamless
Security
undefinedundefinedundefinedundefinedundefined
Immune to
Known
Malware &
Viruses
undefinedundefinedundefinedundefinedundefined
Immune to
Unknown 
Malware &
Viruses
undefinedundefinedundefinedundefinedundefined
Immune to
Known
Vulnerabilities &
Attacks
undefinedundefinedundefinedundefinedundefined
Immune to
Unknown
Vulnerabilities
& Attacks
undefinedundefinedundefinedundefinedundefined
Tracking &
Alerts
undefinedundefinedundefinedundefinedundefined

%d bloggers like this: