Protecting an Enterprise's Most Valuable Resource: Data

Grant Evans, CEO, SPYRUS

Grant Evans, CEO, SPYRUS

The past year challenged enterprises to quickly adapt to remote working, with the majority failing to ensure adequate endpoint security. Cybercriminals saw this as an opportunity, and the FBI warned of a 300% increase in reported cybercrime over the year. According to the Security Bloggers Network, Staggering Phishing Statistics in 2020 include:

• 97% of users were unable to recognize a sophisticated phishing email,

• 95% of all attacks targeting enterprise networks were caused by successful spear phishing, and

• 85% of all organizations were hit by a phishing attack at least once.

These statistics are not unique, however, as this is a recurring theme year after year. Organizations continue to operate with this risk to their—and their customers’—valuable data. Enterprises require security solutions across company issued and owned devices as well as those owned by employees that compensate for user limitations in order to protect data-at-rest, in-use, and in-transit.

For more than 20 years, SPYRUS Solutions has been providing the industry’s most comprehensive security solutions designed to protect data and meet stringent regulatory requirements including GDPR, HIPAA, DFARS, and CMMC.  But more importantly, SPYRUS helps protect your customers’ information, your intellectual property and your Brand. The award-winning SPYRUSDevicePatrol solution arms an enterprise’s IT team with the necessary tools to largely mitigate the risks of constant phishing attacks that target user errors and/ or oversight with the confidence ensured by Military grade encryption and multi-factor authentication (MFA). Easily applied to any device anywhere, the SPYRUS DevicePatrol solution removes the reliance on unsecured communication paths, unintended or malicious—without requiring expensive corporate hardware and ineffective efforts to lock down BYOD.

The SPRYUS DevicePatroltokens, built on a Common Criterial EAL 5+ micro-coprocessor and fully validated at FIPS 140-2 Level 3,offer the strongest data-at-rest protection for a remote or mobile workforce. Available in a variety of form factors including USB 3.0 and MicroSDDevicePatrol tokensare “plug-and-play,” making it easy for users of any technical skill levels to effectively use. Each is tamper-proof and turn any personal computers (including Macs) into trusted enterprise workstations compliant to an organization’s particular policies.

The SPYRUS DevicePatroltokens integrated into IoT and M2M implementations ensure protection across an enterprise architecture—from doors and cameras to copiers and printers. Nearly 60% of IoT devices are vulnerable to attacks, and nearly all current IoT device traffic is unencrypted. Without DevicePatrol, IoT and M2M devices transmit confidential information unencrypted, an easy target for even novice hackers and insider treats. This risk is further compounded as the current architectural efficiency increasingly connects enterprise’s Operational Technology (OT)and Information Technology (IT) networks.

All DevicePatrol tokens and hardened endpoints can be managed remotely by the SPYRUS DevicePatrolPlatform. The device management server allows enterprises to remotely configure, deploy, manage, and audit all endpoint devices. The Platform enforces enterprise endpoint policies such as offline usage and allows an enterprise to remotely disable user access to the device. It can be deployed on premises or in any cloud environment and can scale to support any number of endpoints. If lost or stolen, the enterprise can remotely “destroy” the encryption keys, rendering all data useless.

NcryptNshare is an easy-to-use software application for data encryption and sharing with any SPYRUS DevicePatrol token. The application “seals” any data formatand the individual who creates the data also “owns” it and can share with other DevicePatrol token users. NcryptNshare can also create any number of virtual encrypted vaults on any memory device or network share ensuring data is protected whether it is in-transit or in-use. The vault owner can set basic permissions including read-only access and time limits.

Cybersecurity is the defining and most costly business challenge of the 21st century. According to Accenture, the average cost in time of a malware attack is 50 days while the information loss is valued at $5.9 million. Good cyber hygiene is no longer a “nice to have.”Enterprises cannot rely on user training as it only takes one error to allow a vulnerability to be exploited. The SPYRUS DevicePatrol solution is a necessary element to any business operation, especially when protecting an organization’s most valuable assets. To learn more about SPYRUS and how the DevicePatrol solution can protect your data-at-rest, in-transit, and in-use, visit our website at