Promote this Nomination

Share on FacebookTweet about this on TwitterShare on LinkedIn
CM LogoIcon
CM OfficeCryptoMove Icon
  • Company (that provides the nominated product / solution / service): CryptoMove
  • Website: https://www.cryptomove.com
  • Company size (employees): 1-25
  • Country: United States
  • Type of solution: Software
  • Approximate number of users worldwide: Private alpha

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

CryptoMove is a groundbreaking and innovative approach to data protection that leverages dynamic movement, distribution, mutation, and re-encryption instead of protecting data with conventional static defenses. CryptoMove integrates in any single or multiple cloud environments, moving, distributing, and dynamically mutating data across any number of environments. This unlocks cloud adoption and digital initiatives while increasing security and resiliency, reduces defender workloads, and increases costs and frustrates cyber-adversaries.

CryptoMove is backed and advised by top investors and security industry leaders, including Tim Draper and Draper Associates venture capital firm, as well as early investors, founders, and executives from Palo Alto Networks, FireEye, Palantir, Facebook, Cyphort, Cisco, Juniper, and others.

CryptoMove has a top team that has been on the ground floor of multiple successful enterprise and security startups, has invented distributed programming languages, built next-generation military moving target defense security systems, and has enforced data protection and cybercrime for Fortune 500 technology giants.

In less than 300 words, summarize the most important features and benefits of this product or service

CryptoMove is a new active defense data protection startup in Silicon Valley. CryptoMove’s innovative approach protects data with dynamic movement, distribution, mutation, and re-encryption.

Today’s cloud infrastructure is static and unchanging, making it easy for adversaries to hide in a system, study it, and plan attacks at their leisure. Attackers have an asymmetric advantage and steal clear text, ciphertext, encryption keys, mount cryptographic attacks, destroy data, ransomware data, or corrupt data’s integrity. As data is increasingly stored in third-party cloud environments, trust and control becomes harder. Cloud providers, moreover, aggregate data from many customers, increasing their threat surface.

Traditional security methods rely on prevention and detection–digital equivalents of locks, cameras, traps, walls, and security guards. This fails. Attackers break locks, turn invisible to evade cameras, discover traps, go over and under walls, and there are simply not enough security guards to keep up. To make matters worse, quantum computers threaten to unravel all current encryption in a Y2K-style event.

CryptoMove’s innovative active defense approach makes cloud data a constantly shifting and moving target, even across multiple clouds. Attackers cannot identify data of interest to mount attacks. Time is a disadvantage, because data is constantly moving, fragmenting, and mutating. And if attackers manage to identify, steal, or destroy any data, all they have are worthless encrypted fragments. CryptoMove’s system distributes copies automatically for resiliency and redundancy, and is resilient to attack and failure. Quantum computers don’t matter, because attackers can’t collect encrypted data to brute force.

CryptoMove integrates in any cloud or multiple clouds, allowing applications to leverage multiple environments securely. This unlocks cloud adoption and prevents lock-in into any single cloud. Conventional detection or prevention increases defenders’ work and heightens cyber-adversaries’ asymmetric advantage. And in the cloud, conventional security relies on trust — which is anathema to modern security principles.

cybersecurity_awards_finalist

Leave a Comment.

You need to be a registered member to comment on this nomination.Please register

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.

Sign Up for
Cybersecurity Excellence Awards Updates

Sign up for your award updates! Join thousands of cybersecurity marketers and professionals to receive the latest news about the upcoming Cybersecurity Excellence Awards.