Category Archives: Awards

International awards of Freemindtronic Andorra

image_pdfimage_print

List of Winners Global Infosec Awards 2021

List of Winners Global Infosec Awards 2021

List of Winners Global Infosec 2021 publié sur le site web de CYBER DEFENSE MAGAZINE

  • Access Control Hot Company Safe-T
  • Access Control Market Leader SailPoint
  • Access Control Cutting Edge Sphere
  • Access Control Next-Gen vArmour
  • Account Takeover Protection Most Innovative NuData Security, a Mastercard company
  • Active Directory Security Hot Company Attivo Networks
  • Active Directory Security Next-Gen CionSystems Inc.
  • Advanced Persistent Threat (APT) Detection and Response Editor’s Choice BedRock Systems Inc.
  • Advanced Persistent Threat (APT) Detection and Response Best Product SECUINFRA GmbH
  • Advanced Persistent Threat (APT) Detection and Response Market Leader Group-IB
  • Advanced Persistent Threat (APT) Detection and Response Cutting Edge ARIA Cybersecurity
  • Anti-Malware Best Product Ericom Software
  • Anti-Phishing Most Innovative Ericom Software
  • Anti-Phishing Cutting Edge Inspired eLearning, LLC.
  • Anti-Phishing Hot Company IRONSCALES
  • Anti-Phishing Market Leader KnowBe4
  • Anti-Phishing Next-Gen OnDMARC by Red Sift
  • Anti-Phishing Editor’s Choice SlashNext
  • API Security Most Innovative Salt Security
  • Application Digital Resiliency Solution Most Innovative A10 Networks
  • Application Security Market Leader Checkmarx
  • Application Security Hot Company Contrast Security
  • Application Security Cutting Edge Data Theorem
  • Application Security Editor’s Choice Denim Group
  • Application Security Hot Company Digital.ai
  • Application Security Publisher’s Choice  ForAllSecure
  • Application Security Most Promising HUMAN
  • Application Security Next-Gen Imvision
  • Application Security Cutting Edge Invicti Security
  • Application Security Most Innovative Security Compass
  • Application Security Editor’s Choice vArmour
  • Application Security Next-Gen Verimatrix
  • Application Security Best Product WhiteHat Security
  • Application Security Cutting Edge ZeroNorth
  • Application-aware Workload Protection Hot Company Virsec Systems
  • Artificial Intelligence Market Leader BlackBerry
  • Artificial Intelligence and Machine Learning Best Product Darktrace Holdings Limited
  • Artificial Intelligence and Machine Learning Editor’s Choice Egress
  • Artificial Intelligence and Machine Learning Next-Gen IDology
  • Artificial Intelligence and Machine Learning Cutting Edge LexisNexis Risk Solutions
  • Artificial Intelligence and Machine Learning Hot Company Onfido
  • Artificial Intelligence and Machine Learning Publisher’s Choice  Persona
  • Artificial Intelligence and Machine Learning Cutting Edge Silobreaker
  • Attack Surface Management Publisher’s Choice  Censys
  • Attack Surface Management Cutting Edge Cyberpion
  • Attack Surface Management Cutting Edge Data Theorem
  • Attack Surface Management Next-Gen Intelligent Waves
  • Attack Surface Management Editor’s Choice Randori
  • Attack Surface Management Most Innovative Sweepatic
  • Attack Surface Management Hot Company Zentera Systems, Inc.
  • Attack Surface Management Next-Gen Zscaler
  • Attack Surface Protection Market Leader CyCognito
  • Authentication (Multi, Single or Two-Factor) Most Innovative LexisNexis Risk Solutions
  • Automated Detection Engineering Most Innovative Anvilogic
  • Automated Forensic Malware Analysis and Hunt Tool Cutting Edge Cythereal
  • Biometrics Next-Gen iProov
  • Biometrics Most Innovative Nuance Communications, Inc.
  • Blockchain Security Next-Gen 1Kosmos
  • Breach & Attack Simulation Cutting Edge Cymulate
  • Breach & Attack Simulation Hot Company Keysight Technologies
  • Breach & Attack Simulation Most Innovative Pcysys
  • Breach & Attack Simulation Editor’s Choice Picus Security
  • Breach & Attack Simulation Next-Gen SafeBreach Inc
  • Browser Isolation Most Innovative Proofpoint
  • BYOD Cutting Edge Hypori Inc.
  • Central Log Management Market Leader Fluency Security
  • CEO of the Year Kevin Gosschalk Arkose Labs
  • CEO of the Year Klaus Oestermann BedRock Systems Inc.
  • CEO of the Year Mr. Cesar Pie CSIOS Corporation
  • CEO of the Year Tony Velleca CyberProof
  • CEO of the Year Dr. Aleksandr Yampolskiy SecurityScorecard
  • CEO of the Year Jay Chaudhry Zscaler
  • CEO of the Year Prakash Panjwani WatchGuard Technologies
  • CIEM Hot Company Attivo Networks
  • CISO of the Year Mike Hamilton Critical Insight, Inc
  • CISO of the Year Ryan Weeks Datto
  • Classification and Risk Mapping Cutting Edge Ground Labs
  • Cloud Access Security Broker (CASB) Next-Gen Netskope
  • Cloud Backup Most Innovative Arcserve
  • Cloud Infrastructure Entitlement Management (CIEM) Hot Company Attivo Networks
  • Cloud Infrastructure Entitlement Management (CIEM) Best Product CloudKnox Security
  • Cloud Infrastructure Entitlement Management (CIEM) Hot Company Ermetic
  • Cloud Security Editor’s Choice Anitian
  • Cloud Security Publisher’s Choice  ARMO
  • Cloud Security Cutting Edge Censys
  • Cloud Security Most Innovative Data Theorem
  • Cloud Security Most Innovative Lookout
  • Cloud Security Best Product Netskope
  • Cloud Security Most Promising Orca Security
  • Cloud Security Market Leader RedSeal
  • Cloud Security Next-Gen Sonrai Security
  • Cloud Security Most Innovative ThreatModeler Software Inc.
  • Cloud Security Next-Gen Valtix
  • Cloud Security Hot Company vArmour
  • Cloud Security Cutting Edge Volterra
  • Cloud Security Market Leader Zscaler
  • Cloud Security Automation Hot Company Anitian
  • Cloud Workload Protection Hot Company ARMO
  • Cloud Workload Protection Next-Gen ColorTokens
  • Cloud Workload Protection Editor’s Choice Confluera
  • Cloud Workload Protection Cutting Edge TrueFort
  • Cloud Workload Protection Most Innovative Virsec Systems
  • Cloud Workload Protection Best Product Zscaler
  • Compliance Market Leader A-LIGN
  • Compliance Next-Gen Anitian
  • Compliance Most Innovative Armor
  • Compliance Cutting Edge Atlantic.Net
  • Compliance Best Product BigID
  • Compliance Most Promising Delphix
  • Compliance Publisher’s Choice  Reciprocity
  • Compliance Most Innovative SberBank
  • Compliance Editor’s Choice Spirion
  • Compliance Hot Company Strike Graph
  • Compliance Cutting Edge Tugboat Logic
  • Compliance Automation Cutting Edge Anitian
  • Consent & Preference Management Market Leader OneTrust PreferenceChoice
  • Container Security Most Innovative NeuVector
  • Container Security  Hot Company Virsec Systems
  • Continuous Controls Monitoring Platform Best Product Panaseer
  • Continuous Improvement and Optimization Services  Hot Company CSIOS Corporation
  • Converged IAM Most Innovative ILANTUS TECHNOLOGIES
  • Critical Infrastructure Protection Cutting Edge BedRock Systems Inc.
  • Critical Infrastructure Protection Next-Gen QOMPLX
  • Critical Infrastructure Protection Most Innovative TXOne Networks, Inc.
  • Crypto Security Next-Gen FREEMINDTRONIC
  • Crypto Security Cutting Edge SpyCloud
  • CTO of the Year  Charles Eagan Blackberry
  • CTO of the Year Satya Gupta Virsec Systems
  • Cyber Analytics  Most Innovative Cyberlumeneer
  • Cyber Insurance Editor’s Choice Cowbell Cyber
  • Cyber Threat Intelligence Most Innovative CYFIRMA
  • Cyber Threat Intelligence Best Product Nucleon Cyber
  • Cybersecurity – Healthcare Practices Market Leader Alexio Corporation
  • Cybersecurity Analytics Most Innovative Awake Security
  • Cybersecurity Analytics Cutting Edge ChaosSearch
  • Cybersecurity Analytics Next-Gen LexisNexis Risk Solutions
  • Cybersecurity Analytics Hot Company Spirion
  • Cybersecurity Artificial Intelligence Editor’s Choice Axiado Corporation
  • Cybersecurity Artificial Intelligence Next-Gen Traceable
  • Cybersecurity Artificial Intelligence  Market Leader Darktrace Holdings Limited
  • Cybersecurity Conference   Cutting Edge Semperis
  • Cybersecurity Discovery  Most Innovative Suridata.ai
  • Cybersecurity Education – for Enterprises Hot Company Inspired eLearning, LLC.
  • Cybersecurity Education – for Enterprises Editor’s Choice AwareGO
  • Cybersecurity Education – for Small Business Next-Gen Alexio Corporation
  • Cybersecurity Education – for Small Business Most Innovative Inspired eLearning, LLC.
  • Cybersecurity Innovation Market Leader ANY.RUN
  • Cybersecurity Internet of Things (IoT) Hot Company Onward Security Corp.
  • Cybersecurity Internet of Things (IoT)  Best Product Armis
  • Cybersecurity Internet of Things (IoT)  Cutting Edge Cujo AI
  • Cybersecurity Product Engineeering Services Hot Company Sacumen
  • Cybersecurity Research Most Innovative BlackBerry
  • Cybersecurity Startup of the Year Editor’s Choice Anvilogic
  • Cybersecurity Startup of the Year Publisher’s Choice  BedRock Systems Inc.
  • Cybersecurity Startup of the Year Cutting Edge Cydome Security
  • Cybersecurity Startup of the Year Best Product Cymptom
  • Cybersecurity Startup of the Year Most Promising Cyolo
  • Cybersecurity Startup of the Year Most Innovative DoControl, Inc.
  • Cybersecurity Startup of the Year Next-Gen Keyavi Data Corp.
  • Cybersecurity Startup of the Year Hot Company Salt Security
  • Cybersecurity Startup of the Year Cutting Edge SecurityScorecard
  • Cybersecurity Startup of the Year Next-Gen Stellar Cyber
  • Cybersecurity Strategist of the Year Mr. Clinton Hackney CSIOS Corporation
  • Cybersecurity Training Best Product Checkmarx
  • Cybersecurity Training Cutting Edge Circadence Corporation
  • Cybersecurity Training Next-Gen Fortinet
  • Cybersecurity Training Editor’s Choice Inspired eLearning, LLC.
  • Cybersecurity Training Market Leader KnowBe4
  • Cybersecurity Training Most Innovative MITRE Engenuity
  • Cybersecurity Training Most Promising PECB
  • Cybersecurity Training Market Leader RangeForce
  • Cybersecurity Training for Infosec Professionals Best Product Infosec Inc.
  • Cybersecurity-as-a-Service (CaaS) Next-Gen Allot
  • Cybersecurity-as-a-Service (CaaS) Cutting Edge Cyvatar
  • Data Center Security Market Leader HillStone Networks
  • Data Governance Most Innovative Egnyte
  • Data Leakage Protection Most Innovative Dasera
  • Data Loss Prevention (DLP) Next-Gen Altaro Software
  • Data Loss Prevention (DLP) Cutting Edge CoSoSys
  • Data Loss Prevention (DLP) Editor’s Choice DTEX Systems
  • Data Loss Prevention (DLP) Best Product GTB Technologies, Inc.
  • Data Loss Prevention (DLP) Market Leader Kingston Technology
  • Data Protection Next-Gen ICSDI – ATAGUC SAFE
  • Data Recovery Publisher’s Choice  Rubrik
  • Data Recovery Market Leader SecureData
  • Data Security Best Product BigID
  • Data Security Cutting Edge Cloudrise
  • Data Security Next-Gen Concentric.ai
  • Data Security Next-Gen Egnyte
  • Data Security Market Leader Imperva
  • Data Security Hot Company Keyavi Data Corp.
  • Data Security Most Promising PKWARE
  • Data Security Market Leader Protegrity
  • Data Security Most Innovative RackTop Systems
  • Data Security Publisher’s Choice  Suridata.ai
  • Database Data Breach Prevention Cutting Edge Don’t Be Breached
  • DDoS Protection Scrubbing Center Solution Next-Gen A10 Networks
  • Deception Based Security Market Leader Attivo Networks
  • Deception Based Security Most Innovative Illusive Networks
  • Deep Sea Phishing Next-Gen Ericom Software
  • Deep Sea Phishing Cutting Edge IRONSCALES
  • Deep Sea Phishing Editor’s Choice Tessian
  • Defensive Cyberspace Operations Team of the Year  Publisher’s Choice  CSIOS Corporation
  • DevSecOps Cutting Edge Apiiro
  • DevSecOps Editor’s Choice Data Theorem
  • DevSecOps Most Innovative Denim Group
  • DevSecOps Next-Gen Security Compass
  • DevSecOps Hot Company ZeroNorth
  • Digital Executive Protection Editor’s Choice BlackCloak, Inc.
  • Digital Footprint Security Next-Gen Reflectiz
  • Digital Footprint Security Cutting Edge Resecurity, Inc.
  • Digital Footprint Security Editor’s Choice Spirion
  • Digital Footprint Security Publisher’s Choice  Sweepatic
  • Digital Rights Management Next-Gen Fasoo Co., Ltd.
  • Digital Rights Management Most Innovative i2Chain, Inc.
  • Email Fraud Defense Market Leader Proofpoint
  • Email Security Cutting Edge Microsoft
  • Email Security Most Innovative RevBits LLC
  • Email Security and Management Editor’s Choice Cryptoloc Technology
  • Email Security and Management Best Product Darktrace Holdings Limited
  • Email Security and Management Next-Gen Datto
  • Email Security and Management Cutting Edge IRONSCALES
  • Email Security and Management Market Leader OnDMARC by Red Sift
  • Email Security and Management Publisher’s Choice Perception Point
  • Email Security and Management Market Leader Proofpoint
  • Email Security and Management Hot Company Zix
  • Embedded Security Editor’s Choice Enea
  • Embedded Security Next-Gen Intrinsic ID
  • Embedded Security Cutting Edge Lattice Semiconductor
  • Encrypted Hardware Next-Gen DataLocker
  • Encrypted Hardware Best Product iStorage
  • Encrypted Hardware Most Innovative SecureData
  • Encryption Next-Gen Cryptoloc Technology
  • Encryption Market Leader Kingston Technology
  • Encryption Best Product Quantum Xchange
  • Encryption Cutting Edge RackTop Systems
  • Encryption Editor’s Choice SafeLogic
  • Encryption Hot Company Zoom Video Communications, Inc.
  • Endpoint Detection and Response (EDR) Most Innovative RevBits LLC
  • Endpoint Security Next-Gen Adaptiva
  • Endpoint Security Best Product BlackBerry
  • Endpoint Security Market Leader DriveLock SE
  • Endpoint Security Most Innovative Keeper Security
  • Endpoint Security Cutting Edge McAfee
  • Endpoint Security Market Leader Microsoft
  • Endpoint Security Editor’s Choice RevBits LLC
  • Endpoint Security Cutting Edge SecPod
  • Endpoint Security Most Innovative VMware Carbon Black
  • Endpoint Security Market Leader Zscaler
  • Enterprise Security Publisher’s Choice  Anitian
  • Enterprise Security Cutting Edge Anvilogic
  • Enterprise Security Hot Company Darktrace Holdings Limited
  • Enterprise Security Editor’s Choice ThreatQuotient
  • Enterprise Security Next-Gen vArmour
  • ERP Data Security  Next-Gen Appsian
  • ERP Risk Mitigation Cutting Edge Appsian
  • ERP Security Most Innovative Onapsis
  • Extended Detection and Response (XDR) Most Innovative Beijing ThreatBook Technology Co. Ltd.
  • Extended Detection and Response (XDR) Market Leader McAfee
  • Extended Detection and Response (XDR) Editor’s Choice Microsoft
  • Extended Detection and Response (XDR) Cutting Edge SANGFOR TECHNOLOGIES INC.
  • Extended Detection and Response (XDR) Next-Gen Zentera Systems, Inc.
  • Firewall Market Leader VMware
  • Firewall Best Product Untangle Inc
  • Forensics Most Innovative QuoLab Technologies
  • Fraud Prevention Hot Company Arkose Labs
  • Fraud Prevention Editor’s Choice Bolster
  • Fraud Prevention Publisher’s Choice  Deduce
  • Fraud Prevention Cutting Edge Group-IB
  • Fraud Prevention Next-Gen Kount, An Equifax Company
  • Fraud Prevention Hot Company LexisNexis Risk Solutions
  • Fraud Prevention Most Innovative Pindrop
  • Fraud Prevention Editor’s Choice SberBank
  • Fraud Prevention Hot Company Sumsub
  • Fraud Prevention Next-Gen Veriff
  • Fraud Prevention Best Product XTN Cognitive Security
  • Global Managed Threat Detection and Response Market Leader Trustwave
  • Go-to-market Agency for Cyber Security Startups Most Innovative Punch
  • Governance, Risk and Compliance (GRC)  Best Product Difenda
  • Hardware Password Manager Most Innovative FREEMINDTRONIC
  • Hardware Security Best Product Microsoft
  • Healthcare IoT Security Cutting Edge CyberMDX
  • Healthcare IoT Security Most Innovative Medigate
  • IAM Hot Company Keeper Security
  • IAM Service Market Leader Herjavec Group
  • ICS/SCADA Security Next-Gen Armis
  • ICS/SCADA Security Hot Company Mission Secure
  • ICS/SCADA Security Editor’s Choice TXOne Networks, Inc.
  • ICS/SCADA Security  Market Leader SCADAfence
  • Identity & Access Management Hot Company Axiad
  • Identity & Access Management Editor’s Choice Centrify
  • Identity & Access Management Market Leader CloudKnox Security
  • Identity & Access Management Next-Gen Devolutions
  • Identity & Access Management Cutting Edge HID Global
  • Identity & Access Management Publisher’s Choice  Omada
  • Identity & Access Management Cutting Edge One Identity
  • Identity & Access Management Most Innovative OneLogin, Inc.
  • Identity & Access Management Best Product Optimal IdM
  • Identity & Access Management Most Promising Ping Identity
  • Identity & Access Management Most Innovative QOMPLX
  • Identity & Access Management Next-Gen Saviynt
  • Identity & Access Management Cutting Edge Semperis
  • Identity & Access Management Editor’s Choice SpyCloud
  • Identity Management Cutting Edge Clear Skye
  • Identity Management Best Product SailPoint
  • Identity Management Next-Gen Sonrai Security
  • Identity Management Cutting Edge vArmour
  • Identity Management Market Leader Venafi
  • Identity Verification Cutting Edge Persona
  • Identity Verification Editor’s Choice Veratad Technologies LLC
  • Identity Verification  Most Innovative IDology
  • Identity Verification  Next-Gen Regula
  • Incident Response Editor’s Choice Canopy Software
  • Incident Response Most Innovative Endace
  • Incident Response Next-Gen Group-IB
  • Incident Response Cutting Edge Logsign
  • Incident Response Publisher’s Choice  OTRS Group
  • Incident Response Hot Company QuoLab Technologies
  • Incident Response Most Promising SIRP Labs Limited
  • InfoSec Startup of the Year Next-Gen Clayton
  • InfoSec Startup of the Year Cutting Edge Hysolate
  • InfoSec Startup of the Year Most Innovative King & Union
  • Infosec Startup of the Year Editor’s Choice ShardSecure
  • Insider Threat Detection Market Leader Code42
  • Insider Threat Detection Best Product LinkShadow
  • Insider Threat Prevention Next-Gen DTEX Systems
  • Insider Threat Prevention Cutting Edge Egress
  • Insider Threat Prevention Best Product Gurucul
  • Insider Threat Prevention Most Innovative RackTop Systems
  • Integrated Risk Management  Editor’s Choice CyberSaint Security
  • Internet Filtering Market Leader SafeDNS, Inc.
  • Internet of Things (IoT) Hot Company SCADAfence
  • Intrusion Detection System Most Innovative INTRUSION
  • IT Automation and Cybersecurity Next-Gen Coviant Software
  • IT Vendor Risk Management (ITVRM)  Cutting Edge LogicGate
  • IT Vendor Risk Management (ITVRM)  Editor’s Choice ProcessUnity
  • IT Vendor Risk Management (ITVRM)  Most Innovative Reciprocity
  • Malware Analysis Next-Gen ANY.RUN
  • Malware Analysis Best Product ReversingLabs
  • Malware Detection Most Innovative Microsoft
  • Managed Detection and Response (MDR) Best Solution Alert Logic
  • Managed Detection and Response (MDR) Market Leader AT&T Cybersecurity
  • Managed Detection and Response (MDR) Editor’s Choice Critical Insight, Inc
  • Managed Detection and Response (MDR) Cutting Edge CyberProof
  • Managed Detection and Response (MDR) Market Leader deepwatch
  • Managed Detection and Response (MDR) Next-Gen Difenda
  • Managed Detection and Response (MDR) Most Innovative eSentire
  • Managed Detection and Response (MDR) Hot Company Field Effect Software, Inc
  • Managed Detection and Response (MDR) Market Leader Herjavec Group
  • Managed Detection and Response (MDR) Most Innovative Netsurion
  • Managed Detection and Response (MDR) Publisher’s Choice  Orange Cyberdefense
  • Managed Security Service Provider (MSSP) Next-Gen Avertium
  • Managed Security Service Provider (MSSP) Cutting Edge CyberProof
  • Managed Security Service Provider (MSSP) Best Product deepwatch
  • Managed Security Service Provider (MSSP) Market Leader Herjavec Group
  • Managed Security Service Provider (MSSP) Market Leader Neustar Inc.
  • Managed Security Service Provider (MSSP) Editor’s Choice Orange Cyberdefense
  • Managed Security Service Provider (MSSP) Most Innovative Thrive
  • MDR Service Provider Most Innovative Proficio
  • Micro-segmentation Next-Gen ColorTokens
  • Micro-segmentation Cutting Edge Ericom Software
  • Micro-segmentation Most Innovative Illumio
  • Micro-segmentation Best Product Safe-T
  • Micro-segmentation Editor’s Choice Zentera Systems, Inc.
  • Mobile Application Security Most Innovative Guardsquare
  • Mobile Endpoint Security Next-Gen Guardsquare
  • Mobile Endpoint Security Market Leader Lookout
  • MSSP Best Product AT&T Cybersecurity
  • MSSP Cutting Edge Netsurion
  • MSSP Most Innovative QI-ANXIN Technology Group Inc
  • Multi-factor Authentication Hot Company Axiad
  • Multi-factor Authentication Most Innovative LastPass
  • Multi-factor Authentication Market Leader WatchGuard Technologies
  • Network & Security Management Next-Gen Untangle Inc
  • Network Access Control (NAC) Cutting Edge Portnox
  • Network Detection and Response  Most Innovative Plixer
  • Network Security and Management Cutting Edge AlgoSec
  • Network Security and Management Most Innovative ARIA Cybersecurity
  • Network Security and Management Next-Gen Endace
  • Network Security and Management Market Leader Gigamon
  • Network Security and Management Best Product LogRhythm
  • Network Security and Management Publisher’s Choice Lookout
  • Network Security and Management Hot Company WatchGuard Technologies
  • Network Security and Management Editor’s Choice Zero Networks
  • Next Generation Firewall Most Innovative HillStone Networks
  • Open-Source Security Next-Gen Onward Security Corp.
  • Open-Source Security Cutting Edge Patchstack
  • Open-Source Security Next-Gen Xmirror Security
  • Operational Technology (OT) & Internet of Things (IoT) Cybersecurity Market Leader Nozomi Networks
  • Packet Capture Platform Market Leader Endace
  • PAM for Cloud Infrastructure Best Product CloudKnox Security
  • Passwordless Authentication Best Product Aware, Inc.
  • Passwordless Authentication Most Innovative Axiad
  • Passwordless Authentication Cutting Edge TruU
  • Passwordless Authentication Next-Gen Veridium
  • Pentesting-as-a-service (PtaaS) Next-Gen Cobalt
  • PR Firm for InfoSec Companies Publisher’s Choice  ARPR
  • PR Firm for InfoSec Companies Hot Company LaunchTech Communications
  • PR Firm for InfoSec Companies Market Leader Lumina Communications
  • Privacy Management Software Editor’s Choice IDX
  • Privacy Management Software Next-Gen Spirion
  • Privacy Management Software Cutting Edge TrustArc
  • Privacy Research Solution Most Innovative OneTrust DataGuidance
  • Privileged Access Management (PAM) Next-Gen Fudo Security
  • Privileged Access Management (PAM) Best Product RevBits LLC
  • Privileged Account Security Most Innovative Devolutions
  • Privileged Account Security Market Leader Remediant
  • Railway Cybersecurity Cutting Edge Cervello
  • Ransomless Ransomware Solution Most Innovative Stash Global Inc.
  • Ransomware Protection of SaaS Data Next-Gen Spin Technology, Inc.
  • Ransomware Recovery Solution Cutting Edge Semperis
  • Risk Management Editor’s Choice CyberSaint Security
  • Risk Management Cutting Edge Reciprocity
  • Risk Management Best Product RiskIQ
  • Risk Management  Next-Gen RiskLens
  • Runtime Memory Protection Best Product Virsec Systems
  • SaaS Security Publisher’s Choice  DoControl, Inc.
  • SaaS/Cloud Security Publisher’s Choice  ANY.RUN
  • SaaS/Cloud Security Editor’s Choice Axis Security
  • SaaS/Cloud Security Cutting Edge Beijing ThreatBook Technology Co. Ltd.
  • SaaS/Cloud Security Most Promising Clayton
  • SaaS/Cloud Security Publisher’s Choice  ColorTokens
  • SaaS/Cloud Security Next-Gen ExtraHop
  • SaaS/Cloud Security Market Leader iboss
  • SaaS/Cloud Security Hot Company Lightspin
  • SaaS/Cloud Security Cutting Edge ManagedMethods
  • SaaS/Cloud Security Next-Gen Spin Technology, Inc.
  • SaaS/Cloud Security Editor’s Choice Webscale
  • SaaS/Cloud Security Best Product Zscaler
  • SaaS/Cloud Security  Most Innovative Anitian
  • SD-WAN Cutting Edge HillStone Networks
  • SecOps-as-a-service Most Innovative Cyvatar
  • Secrets Management Next-Gen FREEMINDTRONIC
  • Secure Coding: Developer Upskilling  Most Innovative Secure Code Warrior
  • Secure Communications Best Product BlackBerry
  • Secure Remote Access Next-Gen Fudo Security
  • Secure SaaS Backups Most Innovative Spin Technology, Inc.
  • Security Awareness Training Market Leader Infosec
  • Security Awareness Training Editor’s Choice Proofpoint
  • Security Company of the Year Publisher’s Choice  Anitian
  • Security Company of the Year Market Leader BlackBerry
  • Security Company of the Year Hot Company ColorTokens
  • Security Company of the Year Market Leader Darktrace Holdings Limited
  • Security Company of the Year Editor’s Choice Egress
  • Security Company of the Year Editor’s Choice eSentire
  • Security Company of the Year Most Innovative Herjavec Group
  • Security Company of the Year Cutting Edge Keeper Security
  • Security Company of the Year Next-Gen Lookout
  • Security Company of the Year Cutting Edge Raytheon Intelligence & Space
  • Security Company of the Year Next-Gen ReversingLabs
  • Security Company of the Year Most Promising SANGFOR TECHNOLOGIES INC.
  • Security Company of the Year Most Innovative Zscaler
  • Security Expert of the Year Caroline Wong Cobalt
  • Security Expert of the Year Stuart Reed Orange Cyberdefense
  • Security Governance, Risk and Compliance (GRC) Market Leader SCADAfence
  • Security Information Event Management (SIEM) Cutting Edge Devo
  • Security Information Event Management (SIEM) Editor’s Choice Graylog
  • Security Information Event Management (SIEM) Best Product LogRhythm
  • Security Information Event Management (SIEM) Publisher’s Choice  SECUINFRA GmbH
  • Security Information Event Management (SIEM) Most Innovative Securonix
  • Security Information Event Management (SIEM) Next-Gen Sumo Logic
  • Security Information Event Management (SIEM) Hot Company Thrive
  • Security Investigation Platform Next-Gen Endace
  • Security Investigation Platform Cutting Edge King & Union
  • Security Investigation Platform Most Innovative Swimlane
  • Security Investigation Platform Best Product ThreatQuotient
  • Security Project of the Year Most Innovative BedRock Systems Inc.
  • Security Project of the Year Cutting Edge SberBank
  • Security Project of the Year  Editor’s Choice Zscaler
  • Security Ratings Cutting Edge Panorays
  • Security Ratings Next-Gen RiskRecon, A Mastercard Company
  • Security Software Most Innovative Versa Networks
  • Security Team of the Year Most Innovative Bank of America
  • Security Team of the Year Most Innovative SecurityMetrics
  • Security Training Best Product Field Effect Software, Inc
  • Self-protecting Data Security Cutting Edge Cryptoloc Technology
  • Self-protecting Data Security Next-Gen Keyavi Data Corp.
  • SIEM Most Innovative Logsign
  • Single Sign-on Best Product CionSystems Inc
  • SMB Cybersecurity Editor’s Choice A-LIGN
  • SMB Cybersecurity Best Product Defendify
  • SMB Cybersecurity Next-Gen Devolutions
  • SMB Cybersecurity Most Innovative Field Effect Software, Inc
  • SMB Cybersecurity Cutting Edge JumpCloud
  • SMB Cybersecurity Publisher’s Choice  Orange Business Service
  • SMB Cybersecurity Most Innovative Sectigo
  • SMB Cybersecurity Most Promising TPx
  • SMB Cybersecurity Market Leader WatchGuard Technologies
  • SMB Cybersecurity Cutting Edge Zix
  • SOAR Best Product QI-ANXIN Technology Group Inc
  • SOAR Next-Gen Siemplify
  • SOC-as-a-Service Next-Gen Comtact
  • SOC-as-a-Service Most Innovative Netsurion
  • SOC-as-a-Service Cutting Edge Performanta
  • SOC-as-a-Service Best Product Proficio
  • Software Composition Analysis Cutting Edge Checkmarx
  • Software Composition Analysis Next-Gen GrammaTech
  • Software Development Lifecycle Security Cutting Edge Clayton
  • Telecoms Fraud Prevention Next-Gen SpyCloud
  • Telecoms Fraud Protection Best Product LexisNexis Risk Solutions
  • Third Party Risk Management (TPRM) Best Product CyberGRX
  • Third Party Risk Management (TPRM) Cutting Edge ProcessUnity
  • Third Party Risk Management (TPRM) Most Innovative Reciprocity
  • Third Party Risk Management (TPRM) Next-Gen Resecurity, Inc.
  • Threat Intelligence Market Leader Alert Logic
  • Threat Intelligence Cutting Edge Cobwebs Technologies
  • Threat Intelligence Editor’s Choice Cyware
  • Threat Intelligence Publisher’s Choice  Flashpoint
  • Threat Intelligence Most Promising King & Union
  • Threat Intelligence Editor’s Choice LexisNexis Risk Solutions
  • Threat Intelligence Next-Gen QuoLab Technologies
  • Threat Intelligence Cutting Edge Resecurity, Inc.
  • Threat Intelligence Most Innovative ReversingLabs
  • Threat Intelligence Next-Gen Silobreaker
  • Threat Intelligence Hot Company ThreatQuotient
  • Threat Intelligence   Best Product Beijing ThreatBook Technology Co. Ltd.
  • Threat Modeling Most Innovative ThreatModeler Software Inc.
  • Token Based IAM Hot Company uQontrol
  • Top Women in Cybersecurity Alex Kobray Flashpoint
  • Top Women in Cybersecurity Kimberly Sutherland LexisNexis Risk Solutions
  • Top Women in Cybersecurity Nicola Jakeman Orange Cyberdefense
  • Top Women in Cybersecurity Aimei Wei Stellar Cyber
  • Top Women in Cybersecurity Michel Huffaker ThreatQuotient
  • Top Women in Cybersecurity  Vanita Pandey Arkose Labs
  • Top Women in Cybersecurity  Carolyn Crandall Attivo Networks
  • Top Women in Cybersecurity  Ingrid Gliottone BlackCloak, Inc.
  • Top Women in Cybersecurity  Christina Luttrell IDology
  • Top Women in Cybersecurity  Leah Freiman ItCon Inc.
  • Top Women in Cybersecurity  Anna Collard KnowBe4
  • Top Women in Cybersecurity  Stephanie Fohn NeuVector
  • Top Women in Cybersecurity  Teresa Shea Raytheon Intelligence & Space
  • Top Women in Cybersecurity  Susanne Gurman SecurityScorecard
  • Top Women in Cybersecurity  Lee Kappon Suridata.ai
  • Top Women in Cybersecurity  Alex Kobray TalaTek, a Cerberus Sentinel company
  • Top Women in Cybersecurity  Dr. Nicole Fern Tortuga Logic, Inc.
  • Unified Cloud Edge (UCE) Security Market Leader McAfee
  • Unified Threat Management (UTM) Cutting Edge WatchGuard Technologies
  • User Behavior Analytics Cutting Edge NuData Security, a Mastercard company
  • Vulnerability Assessment, Remediation and Management Next-Gen Adaptive Shield
  • Vulnerability Assessment, Remediation and Management Cutting Edge Pcysys
  • Vulnerability Assessment, Remediation and Management Hot Company SecPod
  • Vulnerability Assessment, Remediation and Management Hot Company SecureWorks
  • Vulnerability Assessment, Remediation and Management Most Innovative SecurityMetrics
  • Vulnerability Assessment, Remediation and Management Best Product XM Cyber
  • Vulnerability Intelligence Cutting Edge Risk Based Security
  • Vulnerability Intelligence Most Innovative RiskSense
  • Vulnerability Intelligence Editor’s Choice Silobreaker
  • Vulnerability Management Publisher’s Choice  Denim Group
  • Vulnerability Management Most Promising Difenda
  • Vulnerability Management Next-Gen Intel
  • Vulnerability Management Cutting Edge Kenna Security
  • Vulnerability Management Most Innovative Pcysys
  • Vulnerability Management Next-Gen RiskSense
  • Vulnerability Management Next-Gen Skybox Security
  • Vulnerability Management (Operational Technology) Hot Company Industrial Defender
  • Web Application Security Publisher’s Choice  Fastly (Signal Sciences)
  • Web Application Security Next-Gen HUMAN
  • Web Application Security Next-Gen Invicti Security
  • Web Application Security Editor’s Choice Kasada
  • Web Application Security Market Leader Neustar Inc.
  • Web Application Security Cutting Edge Patchstack
  • Web Application Security Most Innovative Penta Security Systems Inc.
  • Web Application Security Hot Company Reblaze
  • Web Application Security Most Promising Reflectiz
  • Web Application Security Best Product ThreatX
  • Wireless, Mobile, or Portable Device Security Next-Gen WatchGuard Technologies
  • Wireless, Mobile, or Portable Device Security  Most Innovative Kingston Technology
  • XDR – Extended Detection and Response Cutting Edge Confluera
  • XDR – Extended Detection and Response Best Product Fidelis Cybersecurity
  • XDR – Extended Detection and Response Next-Gen Red Piranha Limited
  • XDR – Extended Detection and Response Most Innovative Stellar Cyber
  • Zero Trust Hot Company Fudo Security

Three Awards 2021

Freemindtronic win awards 2021 Next-Gen in Secrets Management with EviCypher & EviToken Technologies
Freemindtronic win awards 2021 Most Innovative in Hardware Password Manager with EviCypher & EviToken Technologies
Freemindtronic Win Awards 2021 Next-Gen in Crypto Security with EviCypher & EviToken Technologies

NEWS PROVIDED BY
https://cyberdefenseawards.com
May 18, 2021 , 2020, 09:00 ET
Related Links
https://cyberdefenseawards.com/global-infosec-awards-for-2021-winners

SHARE THIS ARTICLE

Freemindtronic Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021

Freemindtronic named Winner of the coveted Global Infosec Awards during RSA Conference 2021 with EviCypher and EviToken technologies patented

Named Winner of the Coveted Global InfoSec Awards FREEMINDTRONIC wins 3 AWARDS in 9th Annual Global InfoSec Awards at #RSAC 2021

SAN FRANCISCO (BUSINESSWIRE) MAY 17, 2021 – Freemindtronic is proud to announce we have won the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine:

Next-Gen in Crypto Security
Most Innovative Hardware Password Manager
Next-Gen in Secrets Management

“We’re thrilled to receive not just one, but three of the most prestigious and coveted cybersecurity awards in the world from Cyber Defense Magazine.  We knew the competition would be tough and with top judges who are leading infosec experts from around the globe, we couldn’t be more pleased,” said Jacques GASCUEL of Freemindtronic.

 “We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cybercrime.  Freemindtronic is absolutely worthy of these coveted awards and consideration for deployment in your environment,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

We’re thrilled to be a member on this coveted group of winners, located here:   http://www.cyberdefenseawards.com/

Trophy Global Infosec Awards Winner Cyber Defense Magazine the Best Crypto Security and Most Innovative in Hardware Password Manager and best Secrets Management Freemindtronic Andorra

Awards Global Infosec Awards News Press

List of Winners Global Infosec Awards 2021

Download

Press release

En  – 📥
Fr   – 📥

Freemindtronic named winner of the coveted Global Infosec Awards during RSA conference red carpet Cybersecurity Safety Andorra three Awards 2021

Please join us virtually at the #RSAC RSA Conference 2021, https://www.rsaconference.com/usa today, as we share our red-carpet experience and proudly display our trophy online at our website, our blog and our social media channels.

About Freemindtronic

Freemindtronic is a Andorran Deeptech which designs and manufactures Greentech products and services in the field of cybersecurity and safety of information systems and computer systems. It develops tailor-made solutions for manufacturers, companies, public services and governments.

About CDM InfoSec Awards

This is Cyber Defense Magazine’s ninth year of honoring global InfoSec innovators. Our submission requirements are for any startup, early stage, later stage or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at www.cyberdefenseawards.com

About the Judging

The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking “What’s Next?” so we are looking for Next Generation InfoSec Solutions.

About Cyber Defense Magazine

With over 5 Million monthly readers and growing, and thousands of pages of searchable online infosec content, Cyber Defense Magazine is the premier source of IT Security information for B2B and B2G with our sister magazine Cyber Security Magazine for B2C. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry.  We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.  Join a webinar at https://www.cyberdefensewebinars.com and realize that infosec knowledge is power.

Continue reading

EviCypher Gold Medal 2021 of the Geneva International Inventions

EviCypher Gold Medal 2021 best invention worldwide gold medal Geneva International Inventions computer sciences software electronics electricity method communication Contactless Hardware Secrets Keeper

EviCypher Gold Medal 2021 best invention worldwide

With EviCypher, create your own encryption keys and exchange, contactless, in complete security with your correspondents.

 

Award 2021 EviCypher best invention worldwide with Gold medal of international inventions of Geneva [1].

 

Personal security should no longer be inAward 2021 EviCypher 200 Technology Gold Medal of the Geneva International Inventions Freemindtronic Andorra the hands of connected digital services, but in those of the individual. Indeed, it is because cybercriminals have access to digital systems that they can carry out their attacks. Freemindtronic’s EviCypher, invented by Jacques Gascuel, establishes an effective physical and digital barrier. It’s an “Air Gap” device that keeps secrets, but that’s not all.

 This individual encryption system gives the person back control of their digital data, from end to end, thanks to a secure NFC device. EviCypher is a physical vault of encryption keys unrelated to a computer system, it communicates with the latter on demand via a near field transmission protocol (NFC). EviCypher is backward compatible with Freemindtronic’s EviToken technology, allowing users of these products to maintain their usual digital services.

A Green tech technology that saves encrypted data for 40 years, without any source of electrical power. It is designed and manufactured without battery, connector, cloud and plastic. The device recovers energy through the NFC signal of the Android phone it is paired with. The latter serves only as an HMI & M2M terminal. Recyclable, the device is solid and waterproof. Extremely durable, it can be sold on the second-hand market after formatting back «factory configuration».

The NFC device works without error between -40° to + 85° C. It offers the user extreme portability of availability of their secrets anywhere, anytime and in any situation.

The solution is designed to preserve extreme anonymity, it leaves no trace of its use or of its user.

In 2019, 100 years after Hugo Alexander Koch’s invention of the first portable electromechanical encryption machine, Jacques Gascuel filed a patent on segmented key authentication. It is based on the principle of Kerckhoffs [2]  according to which the security of a crypto system must be based only on the secrecy of the key and not on that of the algorithm.

In March 2021, after 3 years of research and development, he innovated again by creating the first device dedicated to contactless encryption. The asymmetric and symmetric encryption key mechanism is secured by trust criteria defined at the discretion of an administrator and / or user.

The EviCypher solution allows end-to-end control of data transport, that is, from one EviCypher Card to another EviCypher Card. The encryption key is made up of multiple trust criteria, the origin of which is physical. It is possible to add up to 9 trust criteria to the 3 other criteria generated automatically during the pairing phase. For example, a trust criterion can be a configurable geographic area at the discretion of the person. To use the decryption or encryption key, you must be physically in the predefined zone and validate the 3 other initial trust criteria.

Advantageously, the system deprives cybercriminals of access to the encryption keys by a physical mechanism. Which also makes it a cybersecurity tool to fight identity theft. It can be used to prevent, for example, fraud attacks against the president and to protect against phishing attacks by email in a simple way.

EviCypher is designed to evolve and adapt to existing communication systems such as online or local email services via Thunderbird as well as all instant messaging including SMS & MMS. Unlike messaging systems around the world, messages remain encrypted by default and will be decrypted on demand.

EviCypher Card will be available early May 2021 for pre-order. It can store up to 200 keys for AES256 encryption and up to 4 RSA 2048 keys or 2 RSA 4096 keys.

It is also a password and PIN code manager for secure USB keys EviKey® and secure SSDs EviDisk® made in France by the Syselec Group. It is compatible with EviKeyboard, a virtual keyboard in NFC and Bluetooth version from Freemindtronic.

EviCypher Card is made in Andorra by Freemindtronic.

To download the press releases click HERE

[1] EviCypher dispositif NFC de chiffrement de données Médaille Or 2021 des inventions internationales – YouTube

[2] Auguste Kerckhoffs https://fr.wikipedia.org/wiki/Principe_de_Kerckhoffs





EviCypher Technology NFC hardware wallet encryption key manager password manager gold medal 2021 of the Geneva international inventions secret keeper management by Freemindtronic Andorra


Download press releases 

The following press releases are freely available for download click here



Award 2017 MtoM & Embedded System & IoT

Award 2017 MtoM & Embedded System & IoT Freemindtronic winner in the category Electronic Module / Subsystem with the NFC hardware password manager EviTag operates contactless via an NFC phone. 

 
The jury of the international Award 2017 MtoM & Embedded System & IoT competition named Freemindtronic Andorra as the most innovative company in the field of electronic security and subsystems. 
 

2017 MtoM & Embedded System & IoT Award Freemindtronic winner in the category Electronic Module / Subsystem

The EviTag rugged key fob module that also participated in the FIC 2017 award was also presented to the public at the International Cybersecurity Forum in Lille (France) on 24 and 25 January 2017. To learn more about the award, click here.

Press article: 

http://www.electronique-mag.com/article12494.html

 

Award 2017 MtoM & Embedded System & IoT Freemindtronic Andorra winner in the category electronic module subsystem Jacques Gascuel explains to the public how EviTag hardware password manager working contactless

Award 2017 MtoM & Embedded System & IoT Freemindtronic Andorra winner in the category electronic module subsystem winner jacques gascuel EviTag NFC rugged hardware password manager working contactless

Award 2017 MtoM & Embedded System & IoT Freemindtronic Andorra winner in the category electronic module subsystem picture group winner Jacques Gascuel

Award 2017 MtoM & Embedded System & IoT Freemindtronic Andorra winner in the category electronic module subsystem Christine Bernard Fabrice Castre Jacques Gascuel



2014 Awards Electronics Embedded System Awards EviKey & EviDisk

Embedded Trophy 2014 Freemindtronic

Articles Electronics News Press release Technologies

Freemindtronic’s Legacy: Rediscovering Excellence

Resurrecting Excellence: Freemindtronic’s Legacy in Nanotechnology and the ‘Fullprotect’ Revolution In 2013, Freemindtronic, a visionary [...]

2013 Awards Distinction Excellence Electronics Embedded System Awards Mechatronics

European Mechatronics Award 2013 Freemindtronic

2023 Articles Cyberculture Eco-friendly Electronics GreenTech Technologies

The first wood transistor for green electronics

What is a wood transistor? A transistor is a device that can amplify or switch [...]

2013 Distinction Excellence Electronics Embedded System Awards finalists

Freemindtronic Electrons d’Or 2013


NEWS PROVIDED BY
Embedded system & MtoM & ioT world
May 18, 2017 
Related Links
Trophées de l’Embarqué et des Objets Connectés


SHARE THIS ARTICLE



Award RCO 2017 hardware wallet password manager secured contactless

Award RCO 2017 Hardware Wallet password Manager secured contactless with NFC rugged EviTag by Freemindtronic Made in Andorra

Award RCO 2017 Hardware Wallet password Manager secured contactless with NFC rugged EviTag of Freemindtronic Made in Andorra.

The hardware, Air Gap secure, EviTag NFC password manager from the EviAlpha range works without batteries and without contact via an NFC Android phone. It won the RCO Cyber Security 2017 Trophy for the best demonstration of security and safety of sensitive data. The jury composed of Cybersecurity experts, the audience present in the room and viewers of a TV channel that was broadcasting the demonstration live, overwhelmingly nominated the EviTag NFC solution invented by Gascuel Jacques, CEO of Freemindtronic in Andorra.

Discover in the video below the picht of the inventor Jacques Gascuel for the contest of the best cybersecurity system.

Video Demo show EviTag NFC click here

 

Award FIC 2017 10th Most innovative international startup

Award FIC 2017 10th Most innovative international startup Fullsecure from Freemindtronic Andorra with EviToken Technology


Award FIC 2017 Fullsecure from Freemindtronic is nominated among the 10 finalists of the most innovative companies in Cybersecurity. 
 
The jury of the 9th International Cybersecurity Forum 2017 has nominated EviTag NFC, a NFC hardware password manager that works unlock contactless via an NFC phone. 
 
The EviTag rugged keychain module that participated in the FIC 2017 Award was also presented to the public at the international cybersecurity forum in Lille (France) on 24 and 25 January 2017.
 

Award FIC 2017 NFC rugged hardware password manager work contacless by nfc phone Android

 
EviTag NFC Rugged hardware password manager won other awards such as the 2017 IoT & Embedded Systems Award. To learn more about this award click here.
 
A trade fair organised with our French industrial partner the Syselec Group. Click here to learn more about our industrial partner.
 



FIC 2017 Cybersecurity Exibition France Lille Grand Palais France Fullsecure by Freemindtronic Andorra






Top 10 – FIC 2017



Award FIC 2017 Freemindtronic is nominated among the 10 finalists of the most innovative startup in Cybersecurity Andorra EviTag NFC hardware password manager EviAlpa Technology









NEWS PROVIDED BY
FIC 2017
March 2013
Related Links
https://freemindtronic.com/fic-2017-awards




SHARE THIS ARTICLE





Finalist Contactless Services Challenge

Finalist Contactless Services Challenge Award 2015 EviKey NFC rugged USB Stick unlock contactless and EviDisk SSD Sata 3 by Freemindtronic Andorra Made in France Syselec

Finalist contactless services challenge Award 2015 Freemindtronic is nominated among the finalists of the most innovative companies in NFC system service.

3 minutes was not enough to convince the jury on 12 March 2015 at the Ministry of the Economy, Industry and Digital Affairs in Paris Bercy during the Contactless Services Challenge.
 
Freemindtronic heeft echter in 2016 een industriële partner gevonden de Syselec Group om EviKey en EviDisk te industrialiseren en internationaal te distribueren.
 
Freemindtronic won a prestigious award in 2015 at the same venue in Paris Bercy for EviKey and EviDisk. For more information click here.
 
Watch the video of Jacques Gascuel’s 3 minutes to convince the Jury of the 2015 Finalist contactless services challenge.
 






Top 10 – FIC 2017



Award FIC 2017 Freemindtronic is nominated among the 10 finalists of the most innovative startup in Cybersecurity Andorra EviTag NFC hardware password manager EviAlpa Technology









NEWS PROVIDED BY
Challenge des Services Sans contact
March 2013
Related Links
Retour sur le « Challenge sans contact », un concours de startups réussi




SHARE THIS ARTICLE





FIC 2015 Distinction Excellence 19th Most innovative international startup

FIC 2015 Distinction Excellence 19th most innovative international cybersecurity startup with Freemindtronic EviKey USB stick unlock contactless by nfc phone invented by Jacques Gascuel

FIC 2015 Distinction Excellence Freemindtronic

The jury of the 9th FIC 2015 Distinction Excellence has nominated EviKey NFC Rugged USB Stick & EviDisk  NFC Rugged SSD Sata 3 unlock contactless via an NFC phone. 
 
Award FIC 2015 EviKey NFC rugged USB Stick & EviDisk NFC rugged SSD Sata 3 unlock contactless by nfc phone Freemindtronic Andorra.
 

Award FIC 2015 EviKey NFC rugged USB Stick & EviDisk NFC rugged SSD Sata 3 unlock contactless by nfc phone Freemindtronic Andorra

EviKey and EviDisk have won other awards such as the 2014 Embedded Systems Award. To learn more about this award click here.

Top 19 – FIC 2015

Award FIC 2015 Freemindtronic is nominated among the 19 finalists of the most innovative startup in cybersecurity Andorra EviKey nfc usb stick and EviDisk nfc ssd sata 3 unlock contactless

NEWS PROVIDED BY
FIC 2015
20-21 Janvier 2015
Related Links
www.globalsecuritymag.fr

SHARE THIS ARTICLE

The story of the first NFC hardened USB stick EviKey

Award 2014 NFC EviKey® the story of the first hardened USB stick and NFC EviDisk® SSD Sata 3 unlockable contactless by Freemindtronic Andorra


The story of the first NFC hardened USB stick EviKey & EviDisk unlockable contactless

The story of the first NFC hardened USB stick EviKey that can be unlocked without contact and invisible computer systems begins with inventor Jacques Gascuel.

EviKey is a contactless USB stick which works via an NFC phone. It already has the principle of EviCypher technology. Indeed, it already carries a multi-criterion automated authentication system. It is the first physical multi-factor authentication (MFA) system that can be administered by an unfalsifiable black box.

Let’s start the story of the first contactless unlockable hardened USB stick created by the inventor, Jacques Gascuel  [1]. He  has implemented technology from his patented inventions internationally. For almost 10 years, he has been deeply convinced that the greatest risk will come from the hyperconnection of access controls and their centralization, under the guise of the public interest. That this risk will be all the greater when the burden of proof is reversed, so that user will be technically and financially unable to absolve himself of this legal responsibility.

The inventor includes in his reasoning for the design of electronic safes that there is a significant risk if the access control system is visible,such as a lockand/or keyboard and/or a screen and/or via software. That the best security in the world is human thinking, in contrast to other digitized biometric systems that can be corrupted. The password derived from human thought is becoming more and more complex to implement, due to the exponential increase in connected calculators. According to the inventor, it is necessary to design an augmented thought of man to oppose his own supercomputers.

A real challenge that the inventor will take up for several years to design electronic safes nomadic inviolable.

In the first phase of his research, he had to answer a first question. Is it possible to create real electronic safes for universal portable use without the use of data encryption? Can we create a universal, hyper-mobile security system that does not use an encryption system but only physical security in the sense of Cybersafety? A system, in fact, that can be used all over the world by people with no particular skill. A solution that is non-intrusive, for everyday use, always secure by default, that does not violate any of the rules of international law, and above all that allows to no longer expose man to the attainment of his physical and/or psychological integrity?

The inventor has entered into a disruptive reasoning of Cybersafety, as opposed to Cybersecurity solutions that refer to digital safes. The inventor believes that Cybersecurity is the physical security of Cybersecurity, which is digital. The inventor, a graduate in industrial electrical engineering, will base his research on the implementation of Cybernetic solutions. How can this physical security approach based on industrial normative elements such as ISA/IEC 62443  mitigate or even prevent an intrusive or non-intrusive cyberattack? The first lead was the implementation of its international patent FullProtect  WO/2010/086552,  a device to monitor and protect the power and/or environment of an electrical device, equipped with a black box. An invention that allows, in particular, to establish, by physical evidence, the implementation of the criteria  MTTF,  MTBF,  MTTR and establish the TDM index . To learn more about the features and added values of an electronic safe click HERE.

The inventor’s idea is to find a way to prevent, or greatly limit, the possibility of calculating machines. The inventor imagines an autonomous, unconnected electronic safe that uses various physical, analog, logical, digital, use and legal factors that combined make it extremely complicated, computing by the machine. This will require a physical brute force attack on this electronic safe.

The inventor then designed the first MFA Offline Cyber-sterity system to assist man and allow him to defend himself against his own quantum calculators.

We will tell you the story of the birth of the electronic safe of inventor Jacques Gascuel.

The inventor assumes that the only indisputable, and undisputed, way to secure access controls is that they are never connected and totally autonomous, under the control of the man and/or the legal person.

Such an implementation would make a physically remote attack physically impossible. It talks about the principle of the physical electronic safe unconnected MFA, which implies a proximity to open the door of the electronic safe. According to the very principle of an electronic safe, this system must form a block, without any door other than that locked by an access control, via a code defined by the user. The problem of user authentication remained, and thus the use of the code illegally.

This involved designing an unconnected system, capable of providing a set of factors that would establish the near certainty that it is indeed the user and/or a rightful person.

This risk is increased if this access control is connected to a computer system and/or connected to a local server and/or remote with databases. This is a major breach to carry out attacks via the computer systems where it is connected. This risk increases significantly when access control codes are contained in computer systems and/or remote databases. We all know that they are regularly attacked because they are always accessible from a distance.

The birth of the principle of material invisibility as a physical security component of Cybersecurity

The inventor is aware that the impossibility criterion is a bold claim to be implemented in Cybersecurity. However, if it adds physical security, the foundation of Cybersafety, it makes the solution physically invisible, undetectable and untraceable. Making a physically invisible electronic safe of computer systems has become the preferred focus of the inventor’s research and development.

The term impossibility can legitimately be used, within the limits of the state of the art. Similarly, the inventor considers cyber deterrence to be part of the impossibility factor, especially when the brute force attack means implemented are disproportionate to the interest of the attack. The inventor includes the psychological aspect, …. Doubt! Indeed, consider an attacker who has no certainty of finding the coveted data because it is not directly visible, this will generate a doubt strong enough to be a deterrent. According to this approach, the attacker is also not certain whether the time it will take will not exceed the time it would take the owner of this data to make it obsolete, and therefore worthless for the attacker. The inventor therefore includes doubt as a factor of Cyber Dissuasion in the implementation of the Cybersafety of his electronic safe.

The inventor believes that the absolute security of information systems must be two-headed in the sense that Cybersecurity is the digital component of physical security.

Cybersûreté VS Cybersécurité

Cybersecurity is the physical security in contrast to Cybersecurity which is digital security. This is an approach rarely taken into account in information systems engineering that considers it legitimate that Cybersecurity is outside the realm of Cybersecurity. However, experts in these two spheres of safety agree that the complementarity between safety and security is unquestionably complementary in order to prevent the risk of accidents and/or malicious acts.

Even on the margins in the development of specifications or in the offer of Cybersecurity solutions products and services, Cybersecurity is now essential as digital systems are networked. We are in the era of “hyper-connected.” Cybersafety according to the inventor must also be taken into account from the outset in terms of risk management as defined by various ISO/DIS 34001 (SMS), CNPP 1302 [FR], ISO/IEC 27032 (digital security), ISO/IEC 27001 (SMSI), ISO/IEC 29100, CENELEC 50131-1, 50133-1, 50134-1, 50136-1, 50518-1, IEC 60839-11 [series]. A recurring divide on the interpretation of standards, specifically in their translations of English into French; the word “Security” has been translated as “security” instead of “security” in the sense of physical security. This contributes to the marginalization of the consideration of Cybersafety, and consequently, the distinction between digital safe and electronic safe.

The implementation of the electronic safe has created technological locks to be lifted

How to design a physically invisible access control, totally autonomous in electrical energy, disconnected from computer systems, disconnected from any type of network? The inventor’s idea is to design a system that is physically isolated from computer systems. It seems impossible to attack what doesn’t physically exist, either remotely or nearby.

How can this approach be implemented?

To implement the theory of invisibility, it was necessary to be able to oppose an intrusive and/or non-intrusive brute force attack. The inventor had to find a way to resist physical attacks, especially on the electronics of access control, without reducing the speed of data transfer on the USB port and SATA. The inventor then devised an electronic system with many countermeasures against physical attacks. It is a system that locks access to the contents of the memories, permanently depending on the level of attack detected. The inventor finds a patented, military-grade resin to coat all the electronics, leaving only the USB or SATA connectors. Hardened to the extreme, close to steel, the electronic safe is now equipped with a shell capable of withstanding various mechanical stresses of several tons, thermal or acidic. Attempting to remove the shell is taking the risk of triggering the countermeasures, but also of irreversibly destroying the memories.

Hardening the electronic safe has spawned other technological locks

The complete coating of the electronic card makes it impossible to repair in case of electrical, thermal, component or assembly defects. This makes it very complex to diagnose the origin of the defect automatically, and be able to access from the outside, without going through the USB and SATA connectors. This is where the Fullprotect invention comes into play, an intelligent asymmetrical circuit breaker with a black box that traces any type of electrical, environmental and/or use event. This electronic safe is then equipped with a system of electric multi-protections by automatic galvanic insulation on the power supply, with electrostatic protection on the exchange of data via the USB port or SATA, making the whole resistant to surges. Another three-point thermal environment self-protection device is capable of self-locking the electronic safe, when the temperature is above 70 degrees.

These electronic devices are coupled with the Cybersafety system, which has several advantages. The controlled galvanic insulation protects electrical hazards and insulates it from computer systems, making the electronic safe undetectable. An intelligent maintenance system is then embedded in the system. Its mission is to prevent the electronic safe from being used in temperatures that could damage the electronics. The same device is also used to detect a thermal brute force attack on three points. This type of physical intrusive brute force attack involves exceeding the thermal resistance by more than 220oC.  Such an attack will in fact result in the destruction of electronic components, especially memory, irreversibly. Thanks to the implementation of the Fullprotect invention in these electronic chests, an unfalsifiable black box is present to preserve the various traces of these events and constitute an opposable physical proof.

How do I lift the MFA’s energy autonomy locks?

For the inventor, one last important problem remained to be solved: how, without a source of electrical energy, without using the electrical energy provided by the USB or SATA port, physically administer the access control through the coating and the case?

The solution found by the inventor is THAT of STMicroelectronics’ NFC technology in industrial version, NFC ISO/IEC 15693, which runs without battery, powered via a NFC-enabled Android-enabled computer (Smartphone). In addition, this component incorporates the recovery of energy capable of powering on-board subsystems, including the access control system. These industrial components have many other advantages. They have electronically secure non-volatile memory that can hold stored data for at least 40 years without an electrical source. They also allow 1 million cycles of writing per memory block, without error.

The mobile contactless electronic safes with black box were created under the technological name EviKey One NFC and EviDisk One NFC, under the trademarks of the inventor,  EviKey® for the USB stick and  EviDisk® for the 2.5-inch 7mm Sata III SSD.

But, beyond being able to dynamically carry out all types of actions via contactless technology, a new problem has beenborn, the Cybersecurity of the use of electronic safes. Indeed, it is necessary to have an Android/NFC smartphone to use the electronic safe. However, the smartphone is connected to it, thus exposed to the risk of remote attacks and/or proximity on the exchange of data via the NFC signal.

The Evikey NFC solution receives the 2014-2015 “Connected Object” Package with its Physical Cybersafety technology in a USB stick on November 24, 2014 in Paris Bercy. This innovation is twice nominated for the Boarding Assises: “critical on-board system” and “connected object.” This National Trophy recognizes the connected object project that has provided the most innovative service to the general public or professionals.

Paris Bercy 2014 : https://www.entreprises.gouv.fr/numerique/trophees-embarque-2014 (this page has been removed https://www.entreprises.gouv.fr)

The “Assises de l’Embarqué.fr: http://www.assisesdelembarque.fr/trophees-de-lembarque/trophees-de-lembarque-2014

Captronic : https://www.captronic.fr/Les-laureats-des-Trophees-de-l-embarque-2014.html

Electronic Press (http://www.electroniques.biz):

Embedded Trophies 2014: six companies rewarded for their innovations

lembarque.com : Freemindtronic EviKey Evidisk won the 2014 Embedded Technology Awards 

The inventor had to find other systems to increase the Cybersecurity and “Cybersecurity” of MFA access control for its mobile electronic safes

The various problems to be solved are known and bring up technological locks. How do I protect the access control of an attack from the smartphone? How to identify the hardware used and authenticate the right or user to unlock the electronic safe, knowing that the smartphone is connected and can be very easily corrupted? How do I detect a brute force attack on the NFC? How can I prevent listening to the NFC signal to pick up the information? How can you physically prevent a malicious person or robot from accessing the electronic safe? How do I prevent a keylogger-type attack? How can I prevent the code from being entered on the smartphone screen? How do I limit the number of code tests, even in unlocked mode? How do I identify the electronic safe in a no-use area? How to give the illusion that the electronic safe is broken? How can the electronic safe be used on a daily basis without the burden of security or even the cause of a loss of productivity? How do you detect the end of the use of the electronic safe without having access to the data flow? How do you systematically lock the electronic safe without taking the risk of damaging the data? How do you give up a passcode that you think is corrupt? How do I create a temporary passcode? How do you put all the information back from the black box to serve as physical evidence? How do you simply plot the geolocation of the use of the passcode and the type of code used? How do I notify the user, even if the electronic system fails, the origin of the malfunction? How do I tell the user how long it will take to use memory without error? How can we ensure that the electronic safe is never obsolescent in time? Finally, could this solution save a life?

The inventor has found an answer to all these and many other questions, thanks to another of his patents, Fullsecure[2]  , a stand-alone wireless access control system.

One of the most important challenges remained, the simplicity of use

The inventor’s goal is to offer individual, self-secure, unconnected, obsolescence-free, always accessible, extremely accessible, mobile, very simple to use on a daily basis, for personal and/or professional use, without financial commitment, without a license, multi-station, untraceable and undetectable.

He wanted to offer his owner the least intrusive electronic safe in the world, without drivers and software to install in his computer. An electronic safe compatible with all Windows, Linux, iOS, Raspbian, OS2, Android (OTG) operating systems that use a USB port.

A hardened electronic safe designed to last until the natural end of the components’ life. Multi-protection systems against electrical, electrostatic, thermal, mechanical, immersion in liquid, dust, ultraviolet light, heat source, magnetic field, X-rays.

An electronic safe with a black box that tells the user, in real time, the state of its physical functioning, capable of self-diagnosis and informing the user of the origin of the defect.

The freedom to adapt the level of security of these electronic safes to suit exposure to risk

A system freely set up by the user, via an administrator password, allows you to choose how to unlock the electronic safe. It can also be used in unlocked mode. In the latter case, the user uses his electronic safe in an environment where he feels there is no risk. It uses its EviKey®  or EviDisk® as a standard USB stick or SSD.

How do you make Cybersafety non-binding for the user to avoid being tempted or forced to use another unsecured system?

The inventor believes that the use of safety, when it is binding, generates counter-productivity and is naturally circumvented by man. In fact, the inventor has planned different scenarios that allow the man to change the unlock mode very easily. Man is therefore empowered to adapt the level of security of his electronic safe according to his exposure to risks. When the risk is zero, the man must be able to leave the electronic safe always unlocked. This point eliminates the risk of counter-productivity. This mode allows the man to have the comfort of using a standard USB stick or external disk.

A free mode of Cybersafety by use control

The mere fact that the electronic safe is permanently unlocked creates a risk to the use, because the contents of the electronic safe are always exposed, especially when the sensitive data is not encrypted. The inventor therefore took into account this problem of exposure to the risk of connected data via a removable medium. The right balance had to be struck between safety and comfort of use.

A major constraint for the inventor: the inability to access the fully deconstructive data flow of the MFA access control system and the absence of a battery excluding the use of a clock.

The inventor’s idea was the implementation of a timer in correlation with the Cybersafety system and the black box. The user defines a time, in seconds, during which the Cybersafety system counts, via Fullprotect’s electrical analysis device, the data flow. Thus, when the countdown is reached, the electronic vault is auto-locked and the data stream is inactive.

Thanks to this method, the inventor found the right balance in usage. A system that detects when the electronic safe is not used to self-lock. It is the user who defines how long the electronic safe remains unlocked. The user will need to identify himself to unlock the electronic safe.

With this feature, the user can adjust the use of the electronic safe to his environment, while maintaining a level of self-safety over time. A time that is automatically interrupted when the electronic safe is disconnected from the USB or SATA port. In the same way if the power of the USB or SATA port is disabled by the computer system.

Let’s discover the different ways of unlocking these electronic safes designed by the inventor

A mode that requires the entry of a password to unlock the electronicsafe. A proprietary secure keyboard is used with randomly changing keys, which has the effect of combating malware that records key inputs to the Keylogger type keyboard. This system also helps to limit the risk of visual corruption when entering the password (a person looking over your shoulder for example). Indeed, it is very complex to remember the order of keys that change randomly. In addition, this system allows you to participate in the authentication of a person.

Another mode allows you to unlock the electronic safe without the need to enter the password. After recording the identity of their smartphone in the electronic safe (pairing procedure), the user can unlock it by simply presenting his smartphone to the electronic safe, without contact. The user has the ability to register up to three smartphones.

These two modes can be used interchangeably, this has some advantages. Consider two users, one has knowledge of the password and the other does not. But the latter can unlock the electronic safe with his NFC smartphone, without entering the password.

This is a convenience to avoid having to enter a password or to manage two user profiles, one of which uses only the password. However, this comfort does not cover the risk when the smartphone and electronic safe are stolen or lost together. The electronic safe can then be unlocked without the need to enter the password. To cover this risk, the inventor has planned a multi-factor mode that includes three elements: the pairing key, the smartphone’s identity and the password; the concept of a simplified physical blockchain was born.

The safety of using the electronic safe

Let’s imagine a user on the move, which implies that the level of risk is very high. It must be able to choose the highest and, indeed, most restrictive mode of security. The user leaves the comfort of unlocking with his smartphone without a password, to include a multi-factor control chain in case of theft and/or loss of the electronic safe and/or his smartphone. In case of theft or loss of the electronic safe, the malicious person will have to guess the pairing key, the identity of the paired smartphone and the password. Knowing that after 3 unsuccessful tests, the electronic safe is temporarily blocked and that the maximum allowed test is 13 before a permanent blockage.

Cybersafety against the violation of human physical and/or psychological integrity

The inventor asked himself about the risk of an attack on the physical and/or psychological integrity of an electronic safe user in order to obtain the password?

The inventor’s idea was that the electronic safe must have an advanced system of administration and user management, permanent or temporary. The administrator of the electronic safe has the option to assign a specific passcode to the user of the electronic safe, without him being able to know the administrator password.

The emergency feature called “user password forgetlessness” is born, which allows a user to delete their password. This emergency system can be activated at any time, very quickly, if it feels that its password is corrupt or that it can be corrupted. In fact, only the administrator will be able to recreate a new user password. This is the birth of the physical blockchain simplified by use. A disruptive approach to the use of oblivion in the value chain of Cybersafety as a physical barrier. This protects the physical and/or psychological integrity of the man vis-à-vis an attacker who wishes to obtain the user’s password against his consent.

Imagine an investigative journalist who goes on a mission abroad to interrogate opponents of a dictatorial regime. The information collected by the journalist is digitally housed in the electronic vault. Such information may impair the physical integrity of the interviewees or the journalist. How can the journalist resist a physical and psychological constraint not to give the password to access the electronic safe? The inventor has found a solution! If the user no longer has access to the password because he has voluntarily abandoned it, and this fact is known to the attacker, it will be useless to try to obtain from the user the administrator password that he never knew about. Only the editor (administrator) has the power to unlock the electronic safe. This does not remove the risk that the attacker will remotely pressure the editor to obtain the admin password. However, the objective is achieved, the one where the attacker has no interest in attacking the journalist. And at the same time, the digital data in the electronic safe remains locked in access. The attacker will have to be able to force the electronic safe to access the data it contains.

This case demonstrates the clear role of the importance of cybersecurity vis-à-vis Cybersecurity, the first flaw of which would be humans. On closer inspection, the inventor’s innovations put man at the center of his own enhanced security in the face of malicious attacks by man or his machines.

Cybersafety by physical silos

The inventor performed a physical silo of the rights holders, i.e., an administrator profile and user profiles, indeterminate or limited-time. There is talk of an additional factor to unlock the electronic safe, so as to block any attempt to pair the electronic safe with another smartphone. The power of Cybersafety makes it physically impossible to simply connect with the electronic safe without the pairing key. Even if the pairing key is corrupted, you also need to know the administrator and/or user password to unlock the electronic safe.

The traceability of events by unfalsifiable embedded black box, accessible without contact via the smartphone

The inventor took into account the burden of physical proof in the legal sense of the term, capable of opposing other forms of evidence constituted in a numerical way; which can be manipulated. This is one of the aspects claimed in the internationally extended Fullprotect patent.

Thus, the inventor has integrated in his electronic safe a black box that traces all types of events, which depending on their importance are recorded, such as an attempt to attack physical or digital brute force.

Such a recording in the black box of the electronic safe is not without consequences in the implementation of countermeasures imagined by the inventor whose secrets he does not reveal.

The most extreme consequence is to render the electronic safe irreversibly unusable.

Intrusive and non-intrusive brute force countermeasures

The inventor considered several aspects of brute force attack targeting cyber safety.

Dismissing non-intrusive brute force attacks was quick. It was more complex for the physical attacks of the man of the trade, the electronics engineer.

With regard to non-intrusive attack, the inventor excluded the use of encryption systems in the implementation of Cybersafety, rendering it unnecessary to use thermal, magnetic, electrical, electromagnetic or radio frequency analysis to try to guess the encryption system used. Indeed, the security system is completely independent of the digital support of the electronic vault where digital data is stored. This system is completely autonomous in electrical energy, without battery, and has only one input and exit, the industrial NFC system. This excludes all these forms of brute force attacks.

Remains the physical brute force attack that involves being in contact with the electronics of the electronic safe. An extremely strong resin and very sticky to the components makes it very dangerous to remove the resin without irreversibly damaging the electronic system, especially the memory. Traps have been built to detect intrusions and cause the electronic safe to be permanently locked through the black box.

The digital brute force attack remained to unlock or activate denial of services. The inventor also predicted these cases of species.

All these attempts are managed and activate countermeasures that block this type of attempt.

In the case of a robotic attack the attacker must create algorithms that take into account random physical variables related to physical elements specific to the electronic components used. This makes it almost impossible to create an algorithm capable of guessing these time factors, some of which are variables derived from random physical elements that depend on various thermal, electrical and usage factors.

To maintain a known use of the public, the inventor uses a system used for bank cards or SIM cards of phones.

In this case, three tests (PIN and/or mobile) are authorized to unlock the electronic safe.

After 3 unsuccessful attempts, access is blocked for 15 minutes. The event is recorded in the black box that activates the light signaling of the electronic safe (two green and blue LEDs flash alternately).

The inventor added the requirement to leave the electronic safe connected to the USB or SATA port during the locking period. Any disconnection involves reseating the countdown. This forces the attacker to leave the robot connected to the key. The Cybersafety system has a very precise electrical analysis system; any positive or negative change results in the meter being reset.

After these first 15 minutes it is possible to try again. If the entered password is correct, the electronic safe unlocks and the test counter is reset. The event is kept in the black box. If the PIN or mobile is not correct, the electronic safe is blocked again for 30 minutes this time. With each new error, the delay is multiplied by 2.

This implementation, conceived by the inventor, was intended to deter an attacker from generating a denial of services, i.e., to prevent the user of the electronic safe from using it permanently.

Thus, the attacker will have to wait a few months to be able to seize the 13th unsuccessful test, and thus make the electronic safe permanently locked.

Visionary the cyber-safety of these electronic safes in the service of BYOD, CYOD, COPE already compatible before the birth of the RGPD

Meaning BYOD acronyms “Bring Your Personal Device,”  CYOD  “Choose Your Company-Approved Personal Device,”  COPE  “your personal device purchased by the company.”

10 years earlier, the visionary inventor took into account the problem of the use of private equipment for professional use, which posed a problem related to the privacy of mobile data of various origins, both private and professional or computer systems.

BYOD, CYOD and COP are not framed in the same way at the legal level, which complicates the implementation of the security charter in a company, especially on mobile data such as USB sticks and external discs connected via a USB port. The latter poses a greater risk due to the memory capacity of several terra Bytes.

The use of data encryption is recognized as the only way to secure the data. But the reality is different in the use and security of passwords, encryption keys and/or decryption.

The inventor knows that in everyday use, the complexity of implementing a trusted encryption system is time-consuming, which reduces productivity. In fact, humans bypass the problem by using the unsecured BYOD to transport sensitive data. Similarly, the password entered to decrypt may be corrupted by various brute force attack and/or espionage.

The inventor wonders how to ensure that the Cybersafety system is able to independently cover all these risks? To solve this problem, first, he splits the types of uses into two: an individual use that he identifies as “Premium” and a collective use that he identifies as “Pro”.

Then he comes to the conclusion that the electronic safe is upstream of the backup of the mobile or fixed data, making it a common core. Thus, the mere fact that the principle of the operation of the electronic safe is closed by default and that a password is required to access the data, whether encrypted or not, constitutes a common physical barrier to all these uses. In fact, it is enough to manage the type of use and their use rights.

The professional version was born, which has a separate administration system for users of the electronic safe and an individual version whose administrator is also the sole user.

In case of loss or theft, the electronic safe is always locked which prevents access to the data it contains whether it is private or professional.

Thus, regardless of the choice of the company, CYOD, BYOD or COPE, the inventor’s electronic safes are legitimately compatible with the rules of law in force, notably with the RGPD and the decree 2018-418 of May 19, 2018 coming into force on January 1, 2019. (See on LinkedIn the article of June 13, 2018 https://www.linkedin.com/pulse/pourquoi-les-coffres-forts-%C3%A9lecttronics-nfc-offline-de-gascuel)

As part of a COPE use, the company has a function that allows it to administer a profile of the use of the electronic safe that is required of the permanent and/or temporary user. The black box traceability, allows the administrator to have a history of use, some of which are geo-located.

A 100% stealth mode can be activated by disabling LEDs. In fact, the locked electronic safe, undetectable computer systems, simulates the symptoms of a USB stick that doesn’t work. Similarly, the extinction of LEDs makes it possible not to visually indicate that readings or writings are carried out with the electronic safe. Conversely, the choice of colors, and/or the extinction of one of the LEDs, makes it possible to identify the electronic safe among others. This mode is also convenient for viewing the use of an electronic safe in a prohibited or authorized area. Let’s take the example of an entire service that uses keys whose LED flashes pink when writing or reading data, if the manager sees a key flashing yellow, he will know that this key is an intruder.

The inventor aware of the problems related to the use of USB sticks and external discs in the company has provided a concrete response with the use of his electronic safes.

It was up to the inventor to lift the last locks! How can we make the connection to electronic safes universal to any type of computer system?

Finally, the inventor had to find a way to be as intrusive as possible, when the electronic vault is connected to a particularly professional computer system that prevents the installation of unauthorized software by the information systems manager.

This problem was naturally solved when the separation of the security system and the non-volatile physical memory where the data is housed was implemented.

Indeed, since the security of the electronic safe is separated from the support, there is no need to secure the USB port or the SATA of the SSD disk, so there is no need to install security software on a computer system. In fact, all computer systems that use a USB or SATA port are immediately compatible with safes. No need for drivers or software to install for these electronic safes. This allows to respect the security constraints imposed by the company, while remaining under the control of the user.

The inventor, perfectionist, uses the speed of analog electronics systems to secure the operation of Android applications

The inventor designed two separate applications that work in the volatile memory of the NFC smartphone. FullKey NFC for EviKey NFC Pro and EviDisk NFC Pro and FullKey NFC Premium for EviKey NFC Premium and EviDisk NFC Premium. The inventor used the extreme speed of analog systems and radio frequency to exchange passwords to unlock these safes. This is a machine-to-machine (M2M) transfer between the smartphone’s NFC and the electronic safe NFC.

An intelligent physical cyber safety system is implemented at various points in electronic design to combat brute force attacks that seek to copy the weft of a radio wave produced by the NFC signal:

  • a steering branch,
  • an energy recovery management system,
  • A single peer-to-peer NFC hooking system by pairing key,
  • self-locking electronic vault memories on data exchange,
  • analysis of the electrical energy recovered by the smartphone’s NFC signal,
  • management of the speed of data transfer on NFC signal,

This listening is extremely complex to achieve because of the proximity that must exist between the smartphone and the electronic safe and the fact that the exchange of data is impulse and totally random.

Offline e-mail safes

The inventor had an unstoppable idea to fight against listening to the NFC signal! Desynchronization when unlocking the electronic safe. It adds a new variable: the unpredictable! In fact, the user can unlock his electronic safe without needing to be connected to a USB or SATA port. In fact, an attacker cannot use a computer system and/or power source as a cue to perform his listening. This effectively excludes the use of espionage. Indeed, the unlocking can be carried out anywhere, anytime, in any situation (even underwater), it physically stops any attempt to listen to the NFC signal from the inventor’s electronic safe.

Cybersecurity of Fullkey NFC Pro and Premium applications

The inventor has no confidence in the resilience of a brute force attack on applications developed on Android. In fact, it has taken into consideration immediately in its innovations that its applications can be corrupted in seconds by experts. In fact, he designs applications with a relisence criterion equal to ZERO. Thus, if the application is corrupted, no sensitive information can be used to successfully unlock the electronic safe.

The finding of the implementation of Cybersecurity for the benefit of cybersecurity of electronic safes

The mere fact of not being able to connect to the electronic safe without a pairing key is enough to establish that the inventor’s electronic safe meets all the criteria of Cyber safety.

The simple fact of not being able to unlock the electronic safe without a password, and the fact that the passwords are physically in electronics, it is also not possible to establish a connection with the electronic safe.

The inventor goes all the way to the end of the reasoning of cybersafety by black box: an on-board after-sales service and the management of obsolescence

Obviously, no doubt, never has a USB stick or an SSD been able to inform their user in real time of any type of events, including brute force attacks and to self-diagnose the state of operation of the electronic safe as well as the origin of an electronic, environmental, embedded system, use and attack intrusive or non-intrusive brute force.

Of course, all this will be true, until Jacques Gascuel’s patents fall into the public domain.

Finally, the black box allows the manufacturer, as well as the user, to know the origin of the anomalies, but not only. A flash memory usage counter is built in to estimate the risk of writing or reading errors. The aim is for the inventor to give the user the opportunity to have a trusted benchmark on his ability to retain information without error in the electronic safe. Indeed, flash memories have all the natural wear and tear due to writing that includes data erasure. This is an approximation that varies according to the memories used in the manufacture of electronic safes.

About the company

Jacques Gascuel’s patents are managed by Freemindtronic SL in Andorra.

Electronic safes are currently manufactured in France under an exclusive manufacturing and distribution license for France awarded to the SYSELEC Group in Occitanie (France).

These NFC hardened USB stick EviKey ® and NFC hardened SSD EviDisk® electronic safes are available from Freemindtronic partner’s.

You want to know more about how it works, you can view the usage guides

Fullkey Plus Android app from Freemindtronic Andorra:  https://youtu.be/ckIc7PwedaE

You can also use secret keepers with  EviCypher technology to manage and unlock EviKey  USB sticks and EviDisk SSDs.  Automatically administer and manage  your pairing keys, administrator, user and guest passwords.

[1]  Jacques Gascuel owns various patents. The PATENT WO/2010/086552 published internationally since 2010 for the technology called Fullprotect, a monitoring and protection device for power and/or environmental of an electrical device equipped with an unfalsifiable black box device. And the 2017/129887 WO/2017 patent for the technology called Fullsecure, a wireless electronic access control device with multi-factors of authentication.

[2] Patent called Fullsecure NO.  WO/2017/129887  published in 2017 for the technology called Fullsecure, a wireless electronic access control device with multi-factors of administrative authentication.

Embedded Trophy 2014 Freemindtronic

Embedded Trophy 2014 Freemindtronic Award 2014 Bercy Paris France EviKey NFC rugged USB Stick contactless unlock & NFC SSD Sata 3 Technology patented Andorra Copyright


Embedded Trophy 2014 Freemindtronic 

Embedded Trophy 2014 Freemindtronic receives the award for the best secure connected object with EvIkey NFC, a secure contactless USB key.

At the 2014 Embedded Awards, EviKey was nominated twice in the “critical embedded system” and “connected object” categories. 
 
Its inventor Jacques Gascuel, CEO of Freemindtronic, received the 2014 Trophy for secure connected objects.
 
Jacques Gascuel announced his latest innovation EviDisk, a 2.5″ – 7mm – Sata 3 SSD that is also contactless secure like EviKey. The secure contactless USB stick that wins the award.

Discover in this video, all the pictures of the Embedded Systems Conference with all the participants to this coveted Embedded Systems competition.

Discover the story behind the first EviKey NFC-enhanced USB flash drive by click here.

Discover now our other videos on our youtube channel Click here



Three Awards 2021



Embedded Trophy 2014 Freemindtronic Award 2014 Bercy Paris France EviKey NFC rugged USB Stick contactless unlock and NFC SSD Sata 3 Technology patented Andorra Copyright










NEWS PROVIDED BY
CAP’TRONIC / Embedded France / DGE
March 2013
Related Links
https://www.captronic.fr/Les-laureats-des-Trophees-de-l-embarque-2014.html

https://freemindtronic.com/electroniques-biz-trophy-2014-freemindtronic-evikey-nfc

https://freemindtronic.com/lembarque-trophy-2014

Lauréats 2014: Trophées de l’Embarqué




SHARE THIS ARTICLE





This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.