Enabling Organizational Policies to Drive Security

When policy can be executed by technology — few examples exist. SpiderOak technology allows organizations to match policy to technology.

  1. Public keys are the basis for identity.
  2. Distributed ledgers are the best way to define and maintain roles and permissions.
  3. Once an actor has public keys and a clear set of roles/permissions, it is easy to distribute shared keys enabling secure communication and storage.

SpiderOak has developed technology that allows for the instant provisioning of cryptographically secure collaboration spaces for use in scenarios where certainty about who has access to that space is a mission requirement.

Cryptographic segmentation based on secure private blockchain technology, utilizing FIPS 140–2 encryption, is used to enforce strong assurances of confidentiality, integrity, immutability, and authority.