PerfectCloud gives absolute assurance that even if an attacker was to penetrate a server they would never have enough information, even if actively stealing data out of memory, to ever reconstitute a key or steal an online identity. By ensuring decryption and use of credentials exclusively on the client, it renders cloud servers (which are the single point of security failure and highest risk element in any system) immune to any attacks associated with account compromise. In summary beyond the Smart-Key Algorithm offering a high level of security with the right implementation, it also offers cloud based security and identity management a significant forward evolution that is very compelling and worthy of broad use and deeper integration into various web services.

-Daniel Thanos, Fellow of the U.S. National Board of Information Security Examiners.

We Surpass Our Competitors in terms of Data Security and Privacy

PerfectCloud's solutions are founded on a patented security infrastructure that we developed in collaboration with expert scientists in the field of data security & privacy. We take six steps to achieve your uncompromising data security, backed up by several extra layers of confidentiality. "Privacy" is a concept we respect as much as you do. With our security solutions, only you hold the encryption keys to your data. No service providers. No handing your encryption keys over to institutions. Even our team can't access your credentials. What's yours is strictly yours.

KEY MANAGEMENT THAT JUST WORKS

The key-management protocol protecting your data was developed together with Ganita Labs of the University of Toronto. Nothin...

YOU CAN'T REVERSE ENGINEER THIS

Our approach to encryption is unbreakable. The encryption key distribution is organized in such a way that our solutions are ...

NO COOKIES. NO TOKENS. NO TRACKING.

You and your data simply can't be tracked in any way. Our architecture is based on a cookie-less, token-less principle. Nothi...

THE POWER OF CRYPTOGRAPHIC PROTOCOLS

AES 256. ECC. SHA 512. We leverage series of mathematically-proven cryptographic protocols for your utmost safety. While SaaS...

BENEFITS OF OUR SECURITY

Our Security, developed in a joint-venture with GANITA Lab at the University of Toronto, facilitates a new class of Security, Privacy and Trust for Organizations leveraging the Cloud and Bring-Your-Own-Device (BYOD).
Security settings screen in a tablet

NEVER WORRY ABOUT UNAUTHORIZED ACCESS

We block any unauthorized access before any harm can be done to your data through requiring extensive decryption keys. As there is insufficient data on our server to regenerate the key, any wrongdoers will simply be unable to hack into your database. The same applies in the event your device gets stolen or an institution wants to sniff out your information. You needn't worry about malicious attempts at your cloud data.

CRAFT YOUR OWN SECURITY POLICIES

You now have the freedom to set extensive security policies for your cloud encrypted data. This policies can be applied to either individual users or groups and even your partners or vendors. Manage your requirements for password complexity or credentials expiration time. Configure session timeouts or the maximum number of failed login attempts. Tinker with the types of authentication you want to allow when it comes to your data. You can have it all.

BE IN COMPLIANCE WITH DATA PRIVACY LAWS

As data breaches and security compromise attempts increase, so do various compliance requirements. Failure to meet their postulates can risk the success of your whole business. Our cloud security infrastructure is specifically thought out to ensure your 100% compliance with a wide range of international data privacy laws. Among these are HIPAA, SSAE 16, SOC 1 Type II, SOC 2 Type II, SOC 3 Type III, ISAE 3402, ISO 27001, HITRUST and PCI DSS.

ENJOY ACCESS TO OVER 8000 APPS IN OUR LIBRARY

Our security solutions are integrated with close to 8000 applications or websites: a 50% increase on what our competitors can offer. But it's not only about the quantity; the ability to integrate also matters. Our integrations are easy to execute and any application can be deployed in less than 8 hours. Even if an app can't be integrated, our web hooks will take care of that: a pseudo-code will incorporate the app code so you can nevertheless use it for a single sign-on.
Security settings screen in a desktop computer
Security settings screen in a tablet

HAVE MOBILE SECURITY AT YOUR SIDE

Bring your own device (BYOD) is now a part of the everyday office life. We tackle security risks posed by new devices joining your cloud infrastructure through complex, distributed key management. Devices and apps are under your total control: monitored and secured for your guaranteed safety. You now get to receive the BYOD benefits: increased employee productivity and improved communication, without worrying about security vulnerabilities.

SECURITY & PRIVACY CHALLENGES

Cloud-based services are now increasingly being targeted by cyber criminals because one breach can yield account details of millions of users.

DATA BREACHES INCREASING

Security Breaches are multiplying and attacks are getting more and more sophisticated. Despite using strong encryption, organ...

POOR KEY MANAGEMENT

Data encryption is a crucial part of an organization’s response to security threats and government compliance regulations but...

COMPLIANCE REQUIREMENTS

With growing security and privacy breaches, more government regulations and compliance requirements have sprung up for all ty...

BYOD RISKS

In recent years, the Bring Your Own Device (BYOD) trend has become essential to business, allowing employees to remotely acce...

OUR SECURITY INFRASTRUCTURE

Proper security infrastructure starts with reliable cloud hosting. We use Armor : A global leader in terms of highly secure IaaS providers. There's another reason for using Armor services: their extensive infrastructure security matches our thorough smart-key algorithmic security. Working together, both employ a high-end security model devoid of any vulnerabilities or points of possible compromise. Your data is not only secure. It's immune to hacking attempts and leaks.

Our Extensive Security Model

 Adaptive Security – Regular updates ensure that our infrastructure is always one step ahead of ongoing cybercrime trends. Your protection is maintained through multiple layers of enterprise hardware, frequently patched software, and high-end, expert system configurations..
 Perimeter Security – Your infrastructure is enveloped by an extensive monitoring at any suspicious activity at the network perimeter. Malicious traffic won't ever enter your database. With IP reputation filters in place, as well as DoS/DDoS mitigation, data compromise just won't happen.
 Network Security – Armor's network security layer is merciless to any unauthorized access attempt. No misuse or modification of your network-accessible resources would ever take place. Intrusion detection & prevention mechanisms, paired with unlimited isolated security zones and private network segmentation will keep any cybercriminal away from your information.
 Server Security – Armor security features include a hardened VMWare hypervisor and regular OS patches and updates. Thus your overall security posture and the data contained on cloud servers is secured through hardened points of entry and limited attack vectors. Password security policies and network event logging push your safety to the maximum so you can rest easy.
 Application Security – A unique application security system makes sure that every web application server is hardened during server deployment. With this, any security risk is annihilated and the application attack surface is greatly minimized. In addition, our servers use web application Firewalls (both ports 80 and 443), combined with intelligent WAF policies for any attacks you might fear.
 Fluidscale technology – Gone are the times of downtime during crucial loads or unexpected traffic surges. Armor uses FluidScale, an intelligent technology that eliminates the required reboot in order to add memory or processor resources. You can now meet your website and applications resource demands without experiencing frustrating offline time that costs you customer trust and money.