Reach us at 503.226.3939 or


Cybersecurity for Enterprise

Consolidating information in the cloud is the norm since it dramatically enhances productivity. However, this consolidation means the sheer number of individuals – employees, vendors and visitors – in any corporation that have access to these systems presents a challenge for enterprise security managers, both in terms of physical security of the various assets and premises as well as the security of the information systems. The proliferation of portable devices (mobile phones, tablets, laptops) and mobile workforces has compounded the complexity. To further add to the challenge, cyber-attacks are on the rise and becoming increasingly costly.

By way of examples – personal information for over 200 million users was compromised between eBay and JPMorgan Chase in 2014; 4.5 million patients’ information of Community Health Systems was breached in 2014.

Legacy security solutions that rely on analytics and passwords alone have proven to be ineffective. The cloud allows authorized users to access sensitive data remotely, equally enabling hackers to do the same, since the cloud has inadequate protections on differentiating between an authorized user and a hacker. The only effective way to mitigate these risks is to enable high-grade endpoint hardware security in the hands of authorized users. The Connected Smart Card™ (CSC) security hardware and platform patented by Tyfone is such a solution.

Tyfone’s solutions for digital identity and transaction security are protected by over 140 issued and pending patents and over 1,300 issued invention claims. Tyfone’s customers include major enterprises, critical infrastructure, financial services institutions, and the US Government.

Solution Overview

While the key to efficient information access is to centralize it in the cloud, the key to effective enterprise security is decentralized secure storage of encryption keys along with strong authentication. Data encryption without decentralized storage of encryption keys has become grossly inadequate. Tyfone’s Secure Transaction Platform will help to:

  • Enforce strong authentication of users
  • Secure sensitive information in the cloud by decentralizing key storage
  • Protect data access on any device (phones / tablets / PCs) on all major OS
  • Prevent snooping and tampering of data transmission
  • Secure existing wireless voice communication channels without having to build redundant networks

Tyfone Secure Transaction Platform

Apart from enabling ubiquitous connectivity to smart card chips, through a robust set of software APIs and CSC device form factors, the platform allows for secure over-the-air (OTA) provisioning and management of security applets, keys and identities remotely to the CSC device. A single CSC device can be used for multiple applications and use cases. For example, X.509 certificate for establishing a mutually authenticated secure communication channel and/or secure storage for keys for encryption of data at rest or data in transit. Tyfone’s APIs are PKCS11 compliant enabling standard cryptographic protocols and algorithms on Tyfone’s security platform.

Applications Enabled By Tyfone Security

Tyfone security technologies can be deployed in a variety of digital and physical security applications to secure the identity of people and devices. Transaction security is implemented with policy-based risk management with stepped up security.

  • Secure Identity – Enabling CAC, PIV, Derived Credential
  • Securing the Internet of Things
  • Device Data Encryption (Data at Rest)
  • BYOD Key Store and Security
  • Secure Browser
  • Digital Signatures
  • Document Signing
  • VoIP encryption on Data Network
  • Voice encryption for any device on Circuit Switched Network
  • Facilities Access Control

Are you interested in identity & transaction security or secure digital banking solutions?