image_pdfimage_print

Our articles

Our articles of freemindtronic Andorra

Welcome to the publication of our articles

Our articles deal with the subject of data protection, access control, safety and security.
We cover a wide range of related topics that can be technical, legal and scientific.
It is also a way to give you advice on how to use the technologies we develop, but not only.
We hope that this space will satisfy your curiosity.
Subscribe to our new letter, to be always informed as soon as a new article is published.
 
We wish you a pleasant visit on the Freemindtronic.com website. Take the time to read our new click here
 
ANSSI Cryptography Authorization: Complete Declaration Guide

Complete Guide: Declaration and Application for Authorization for Cryptographic Means In France, the import, export, [...]

New Microsoft Uninstallable Recall: Enhanced Security at Its Core

Microsoft’s Revamped Recall System Microsoft recently overhauled its Recall feature, which had faced criticism for security [...]

EAN Code Andorra: Why It Shares Spain’s 84 Code

All About EAN Codes and Their Importance EAN Code Andorra illustrates how the EAN (European [...]

Russian Espionage Hacking Tools Revealed

Russian Espionage Hacking Tools: Discovery and Initial Findings Russian espionage hacking tools were uncovered by [...]

End-to-End Messaging Encryption Regulation – A European Issue

Regulation of Secure Communication in the EU The European Union is considering measures to regulate [...]

NFC vCard Cardokey: Revolutionizing Digital Networking

NFC vCard: Revolutionize Your Professional Networking As the creator of Cardokey, I am thrilled to [...]

EU Sanctions Cryptocurrency Regulation: A Comprehensive Overview

EU Sanctions Cryptocurrency Regulation: A Comprehensive Overview The EU is stepping up its regulatory game [...]

Midnight Blizzard Cyberattack Against Microsoft and HPE: What are the consequences?

Midnight Blizzard Cyberattack against Microsoft and HPE: A detailed analysis of the facts, the impacts [...]

2 Comments

Encrypted messaging: ECHR says no to states that want to spy on them

Encrypted messaging: ECHR says no to states that want to spy on them The historic [...]

BitLocker Security: Safeguarding Against Cyberattacks

Introduction to BitLocker Security If you use a Windows computer for data storage or processing, [...]

1 Comment

How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts

How the attack against Microsoft Exchange on December 13, 2023 exposed thousands of email accounts [...]

How to protect yourself from stalkerware on any phone

What is Stalkerware and Why is it Dangerous? Stalkerware, including known programs like FlexiSpy, mSpy, [...]

Human Limitations in Strong Passwords Creation

Human Limitations in Strong Passwords: Cybersecurity’s Weak Link Passwords are essential for protecting our data [...]

Terrapin attack: How to Protect Yourself from this New Threat to SSH Security

Protect Yourself from the Terrapin Attack: Shield Your SSH Security with Proven Strategies SSH is [...]

Google OAuth2 security flaw: How to Protect Yourself from Hackers

Google OAuth2 security flaw: Strategies Against Persistent Cookie Threats in Online Services Google OAuth2 security [...]

Telegram and the Information War in Ukraine

How Telegram Influences the Conflict between Russia and Ukraine Telegram and the information war in [...]

Kismet iPhone: How to protect your device from the most sophisticated spying attack?

Kismet iPhone: How to protect your device from the most sophisticated spying attack using Pegasus [...]

The American Intelligence: How It Works

The American Intelligence: How It Works, Its Limits and Consequences The American intelligence is one [...]

Ledger Security Breaches from 2017 to 2023: How to Protect Yourself from Hackers

Ledger Security Breaches from 2017 to 2023: How to Protect Your Cryptocurrencies from Hackers Have [...]

TETRA Security Vulnerabilities: How to Protect Critical Infrastructures

TETRA Security Vulnerabilities: How to Protect Critical Infrastructures from Cyberattacks TETRA (Terrestrial Trunked Radio) is [...]

DataShielder Defense NFC HSM: Protect Your Sovereign Communications

DataShielder Defense NFC HSM: How to Protect Your Sovereign Communications with a Revolutionary Solution The [...]

3 Comments

FormBook Malware: How to Protect Your Gmail and Other Data

How to Protect Your Gmail Account from FormBook Malware Introduction Imagine that you receive an [...]

Dual-Use Encryption Products: a regulated trade for security and human rights

The international regulations on dual-use encryption products The main international regulations that apply to dual-use [...]

2 Comments

Quantum computing RSA encryption: a threat and a solution

Quantum computing RSA encryption: a challenge and a solution Quantum computing RSA encryption is a [...]

NFC Business Cards with Cardokey free for life: How to Connect without Revealing

NFC Business Cards: Create your NFC vCard with Cardokey, the Eco-Friendly and Secure NFC App [...]

Pegasus: The cost of spying with one of the most powerful spyware in the world

Pegasus: The Cost of Spying with the Most Powerful Spyware in the World Pegasus is [...]

Chinese hackers Cisco routers: how to protect yourself?

How Chinese hackers infiltrate corporate networks via Cisco routers A Chinese-backed hacker group, known as [...]

RSA Encryption: How the Marvin Attack Exposes a 25-Year-Old Flaw

How the RSA Encryption – Marvin Attack Reveals a 25-Year-Old Flaw and How to Protect [...]

Communication Vulnerabilities 2023: Avoiding Cyber Threats

Communication Vulnerabilities in 2023: Unveiling the Hidden Dangers and Strategies to Evade Cyber Threats 2023 [...]

ZenRAT: The malware that hides in Bitwarden and escapes antivirus software

How this malware hides in Bitwarden and escapes antivirus software to steal your information ZenRAT [...]

Freemindtronic’s Legacy: Rediscovering Excellence

Resurrecting Excellence: Freemindtronic’s Legacy in Nanotechnology and the ‘Fullprotect’ Revolution In 2013, Freemindtronic, a visionary [...]

How to secure your SSH key with NFC HSM USB Drive EviKey

How to create and protect your SSH key with NFC HSM USB drive The NFC [...]

Enhancing Crypto Wallet Security: How EviSeed and EviVault Could Have Prevented the $41M Crypto Heist

EviSeed and EviVault NFC HSM Technologies could have prevented the $41 million crypto theft by [...]

Why choose a Cold Wallet NFC HSM to secure your cryptocurrencies?

How to secure your cryptocurrencies with a cold wallet NFC HSM is the topic of [...]

How to choose the best multi-factor authentication method for your online security

Everything you need to know about multi-factor authentication and its variants Have you ever wondered [...]

How to Recover and Protect Your SMS on Android

Recover and Protect Your SMS on Android: A Complete Guide First of all, SMS are [...]

Coinbase blockchain hack: How It Happened and How to Avoid It

How to Prevent Coinbase Blockchain Hack with EviVault NFC HSM Technology What happened to Coinbase [...]

Protect yourself from Pegasus spyware with EviCypher NFC HSM

How to protect yourself from Pegasus spyware with EviCypher NFC HSM Pegasus Spyware: what it [...]

Unitary patent system: why some EU countries are not on board

Why some EU countries are not on board What is the unitary patent? The unitary [...]

Protect US emails from Chinese hackers with EviCypher NFC HSM?

How EviCypher NFC HSM technology can protect emails from Chinese hackers The Chinese hack on [...]

Ommic case: How a French company allegedly handed over military secrets to China and Russia

Ommic case: The story of a French semiconductor company accused of spying for China and [...]

EviVault NFC HSM vs Flipper Zero: The duel of an NFC HSM and a Pentester

EviVault NFC HSM vs Flipper Zero: The duel of an NFC HSM and a Pentester [...]

Digital signature: How Freemindtronic secures its software

What is digital signature? Digital signature is a process that allows to authenticate the origin [...]

PassCypher NFC HSM: Secure and Convenient Password Management

PassCypher NFC HSM and PassCypher Pro NFC HSM: Secure and Convenient Password Management Introduction PassCypher [...]

1 Comment

NRE Cost Optimization for Electronics: A Comprehensive Guide

Efficient NRE Cost Optimization for Electronics NRE Cost Optimization, in the field of electronic product [...]

Securing IEO STO ICO IDO and INO: The Challenges and Solutions

Securing IEO STO ICO IDO and INO: How to Protect Your Crypto Investments Cryptocurrencies are [...]

Remote activation of phones by the police: an analysis of its technical, legal and social aspects

What is the new bill on justice and why is it raising concerns about privacy? [...]

Protect Meta Account Identity Theft with EviPass and EviOTP

Protecting Your Meta Account from Identity Theft Meta is a family of products that includes [...]

How BIP39 helps you create and restore your Bitcoin wallets

How BIP39 helps you create and restore your Bitcoin wallets Do you struggle to manage [...]

Segmented key authentication: an innovation by Jacques Gascuel to secure sensitive data

Segmented key authentication: an innovation by Jacques Gascuel to secure sensitive data What is segmented [...]

1 Comment

Recovery Phrase Backup: How to Secure It

This article will be updated with any new information on the topic, and readers are [...]

1 Comment

BITB Attacks: How to Avoid Phishing by iFrame

BITB Attacks: How to Avoid Phishing by iFrame We have all seen phishing attacks aren’t [...]

Snake Malware: The Russian Spy Tool

Snake: The Russian malware that steals sensitive information for 20 years Snake is a malware [...]

ViperSoftX How to avoid the malware that steals your passwords

ViperSoftX: The Malware that Steals Your Cryptocurrencies and Passwords ViperSoftX is a malware that steals [...]

1 Comment

What is Juice Jacking and How to Avoid It?

Juice Jacking: How to Avoid This Cyberattack Do you often use public USB chargers to [...]

Strong Passwords in the Quantum Computing Era

How to create strong passwords in the era of quantum computing? Quantum computing is a [...]

2 Comments

Protect Your Data from AMOS Malware

AMOS Malware Protection with Keepser Cold Wallet The Threat of AMOS Malware on macOS AMOS [...]

1 Comment

Cryptbot malware steals data cryptocurrencies

Understanding Cryptbot Malware: A Comprehensive Guide to the Threats and Risks Cryptbot malware is a [...]

1 Comment

The first wood transistor for green electronics

What is a wood transistor? A transistor is a device that can amplify or switch [...]

Kevin Mitnick’s Password Hacking with Hashtopolis

Password hacking tool: how it works and how to protect yourself Password hacking is a [...]

KingsPawn A Spyware Targeting Civil Society

  QuaDream: KingsPawn spyware vendor shutting down in may 2023 QuaDream was a company that [...]

Our articles

Welcome to the publication of our articles Our articles deal with the subject of data [...]

Phishing Cyber victims caught between the hammer and the anvil

Phishing is a fraudulent technique that aims to deceive internet users and to steal their [...]

766 trillion years to find 20-character code like a randomly generated password

766 trillion years to find randomly generated 20-character code like randomly generated password 766 trillion [...]

Freemindtronic 4YFN 2021

Freemindtronic 4YFN 2021 GSMA andorra business 2021 hall 2 stand 2F3.6

Freemindtronic 4YFN 2021 – We will be present in Barcelona from June 28 to July 1st on Stand Andorra Business 2F3.6 in Hall 2.

Come discover and try our new contactless technologies, including environmentally friendly hardware wallets that run for life, without battery.

The technologies presented by the Freemindtronic Team won 4 prestigious international awards in 2021. The gold medal for the best invention 2021 in computer science, software, electronics, electricity and communication methods and 3 Global Infosec Awards, for the most innovative hardware password manager, the best secure cold wallet and the best secrets management.

Come to our booth to preview EviCypher, a full encryption solution and EviKey USB Stick contactless unlocking that embed Freemindtronic’s patented NFC technologies.

If you want to know more about the prizes won by Freemindtronic in 2021, click here.
 
You would like to meet us in the space dedicated to 4YFN business meetings, click here.
 

You can also contact us using the form below for Freemindtronic 4YFN 2021 👇.

4 international awards 2021 freemindtronic for evicypher & evitoken Technology patented andorra

2017 ACTINN Events EviCard NFC HSM EviTag NFC HSM

INNTEC 2017: Contactless security innovations by Freemindtronic

2023 Events

THcon 2023: A Cybersecurity Conference and CTF in Toulouse

Why should you attend THcon 2024? THcon is a must-attend event in Occitania for learning, [...]

2024 Eurosatory Events Exhibitions Press release

Eurosatory 2024 Technology Clusters: Innovation 2024 DataShielder Defence

Events Exhibitions

Freemindtronic 4YFN 2021

Eurosatory Events Exhibitions

Exhibitors list Eurosatory 2022 and Freemindtronic Story

2022 Events Exhibitions

Freemindtronic at Eurosatory 2022

Where to find us at Eurosatory 2022

NEWS PROVIDED BY
4YFN – 2021
May 18, 2021 , 2020, 09:00 ET
Related Links
4YFN RDV Exhibitor

SHARE THIS ARTICLE

    Press releases and documents

    Eurosatory 2022 Freemindtronic Andorra presents the first time in its history its latest innovations in safety cyber security & anti-spying Soldier NFC phone

    Welcome to the Freemindtronic press releases and documents area

    Press releases and documents of Freemindtronic can be downloaded and viewed online of PDF format. We hope that this area will provide you with all the information you need for your publications.

    You can also contact us to obtain other information, documents, photos, images and other file formats, unpublished video click here.

    Below, choose the press releases you are interested in. You have a summary of these latter, and they are downloadable for free.

    You can also find more information about Freemindtronic technology on the websites click here

    We wish you a pleasant visit to our site.

     

    The Freemindtronic press

    The Freemindtronic press


    2024 Eurosatory Events Exhibitions Press release

    Eurosatory 2024 Technology Clusters: Innovation 2024 DataShielder Defence

    Articles Electronics News Press release Technologies

    Freemindtronic’s Legacy: Rediscovering Excellence

    2022 CyberStealth Eurosatory Press release

    EviStealth Technology at Eurosatory 2022

    2022 Cyber Computer Eurosatory Press release

    Cyber Computer at Eurosatory 2022

    2022 Contactless Dual Strongbox Eurosatory Press release

    The Contactless Dual Strongbox for sensitive data at Eurosatory 2022

    Press release

    Press releases and documents

    Press

    The Freemindtronic press

    Cyber Defense Magazine TV News Press

    Interview of Christine Bernard by Gary Miliefsky of cyber defense magazine

    Awards Global Infosec Awards News Press

    List of Winners Global Infosec Awards 2021

    ACTINN Andorra Media coverage of Freemindtronic Press

    Freemindtronic Guanya La Medalla D’or

    Press release

    Best international invention 2021

    2018 EviCard NFC HSM EviPass NFC HSM technology EviTag NFC HSM News Press Technical News Technologies

    Advanced Credit Card Cybersecurity: A Service to End Bank Card Fraud Practices

    2014 Electronique Mag Press

    Enova Paris 2014 interview by Jacques Gascuel Electronique Mag

    Argos One Technology Press

    Freemindtronic startup of the month March 2013

    Awards of Freemindtronic

    Awards of Freemindtronic Technology DataShielder HSM Encryption Fortress Award 2023

    Awards of Freemindtronic: a showcase of excellence and innovation in data security

    Freemindtronic is a company that has been recognized worldwide for its outstanding achievements in developing and providing data security solutions. Since its creation in 2009, Freemindtronic has received numerous awards and distinctions from prestigious organizations and events that celebrate the best in technology and innovation. In this page, you will find a comprehensive list of all the awards and distinctions that Freemindtronic has won over the years, as well as the details of each recognition and the products or services that were honored.

    Awards and distinctions from 2010 to 2014

    Some of the most notable awards and distinctions that Freemindtronic received in this period are:

    • The Silver Medal at the International Exhibition of Inventions of Geneva in 2010. It was for FullProtect, a system that protects electronic devices from electromagnetic attacks.
    • The Electron d’Or Award in 2013 for EviKey, the first NFC USB stick. It can be unlocked with a smartphone or a tablet.
    • The European Mechatronics Award in 2013 for EviKey, which was praised for its innovative design and functionality.
    • The RFID Award in 2014 for EviKey, which was presented by Jacques Gascuel. He is a renowned expert in RFID technology
    • The Embedded Trophy in 2014 for EviKey, which was selected as the best embedded system of the year.

    Awards and distinctions from 2015 to 2017

    Some of the most notable awards and distinctions that Freemindtronic received in this period are:

    • The Finalist Award at the International Cybersecurity Forum (FIC) in 2015 for EviKey. It was among the top 10 cybersecurity solutions of the year.
    • The Finalist Award at the Contactless Services Challenge in 2015 for EviKey. It was among the best contactless solutions of the year.
    • The Top 10 Cybersecurity Award at the FIC in 2017 for EviDisk, the first NFC hardened disk drive. It can be unlocked with a smartphone or a tablet.
    • The RCO Award in 2017 for EviToken, a hardware wallet and password manager. It is secured by contactless technology.
    • The MtoM & Embedded Systems Award in 2017 for EviDisk, which was chosen as the best IoT solution of the year.

    Awards and distinctions from 2021 to present

    Some of the most notable awards and distinctions that Freemindtronic received in this period are:

    Some of the most notable awards and distinctions that Freemindtronic received in this period are:

    • The Silver Medal at the International Exhibition of Inventions of Geneva in 2010. It was for FullProtect, a system that protects electronic devices from electromagnetic attacks.
    • The Electron d’Or Award in 2013 for EviKey, the first NFC USB stick. It can be unlocked with a smartphone or a tablet
    • The European Mechatronics Award in 2013 for EviKey, which was praised for its innovative design and functionality
    • The RFID Award in 2014 for EviKey, which was presented by Jacques Gascuel. He is a renowned expert in RFID technology
    • The Embedded Trophy in 2014 for EviKey, which was selected as the best embedded system of the year

    These awards and distinctions demonstrate the high quality and reliability of Freemindtronic products and services. They also show the creativity and innovation of Freemindtronic team. They reflect the vision and mission of Freemindtronic, which is to offer data security solutions that are easy to use, accessible to everyone and respectful of privacy. By visiting this page, you will learn more about Freemindtronic achievements and why Freemindtronic is a trusted leader in data protection.


    2022 Awards Cybersecurity EviCypher Technology

    Gold Globee Winner 2022 Cyber Computer NFC

    Awards CES Awards Distinction Excellence

    Keepser Group Award CES 2022

    2022 Events EviCypher NFC HSM Exhibitions Licences Freemindtronic NFC Contactless

    Secure Card CES 2022

    2021 Cybersecurity Distinction Excellence EviCypher Technology finalists

    E&T Innovation Awards Cybersecurity

    2021 Awards Communications Distinction Excellence EviCypher Technology finalists IT

    E&T Innovation Awards Communications & IT

    2021 Distinction Excellence The National Cyber Awards

    Highly Commended at National Cyber Awards: Freemindtronic’s 2021 Success

    2021 Awards Distinction Excellence finalists

    Finalists The National Cyber Awards 2021

    Awards Cyberculture EviCypher Technology International Inventions Geneva NFC HSM technology

    Geneva International Exhibition of Inventions 2021

    Awards Global Infosec Awards News Press

    List of Winners Global Infosec Awards 2021

    2021 Awards International Inventions Geneva

    EviCypher Gold Medal 2021 of the Geneva International Inventions

    2017 Awards Embedded System Awards IoT

    Award 2017 MtoM & Embedded System & IoT

    2017 Cybersecurity finalists

    Award FIC 2017 10th Most innovative international startup

    2015 finalists NFC Contactless

    Finalist Contactless Services Challenge

    2015 Awards Distinction Excellence EviKey & EviDisk

    FIC 2015 Distinction Excellence 19th Most innovative international startup

    2014 Awards Embedded System Awards EviKey & EviDisk News

    The story of the first NFC hardened USB stick EviKey

    2014 Awards Electronics Embedded System Awards EviKey & EviDisk

    Embedded Trophy 2014 Freemindtronic

    2014 Distinction Excellence EviKey & EviDisk NFC Contactless

    RFID Award 2014 🎙️ Jacques gascuel presents NFC USB Stick EviKey

    2013 Awards Distinction Excellence Electronics Embedded System Awards Mechatronics

    European Mechatronics Award 2013 Freemindtronic

    2013 Distinction Excellence Electronics Embedded System Awards finalists

    Freemindtronic Electrons d’Or 2013

    2010 Awards International Inventions Geneva

    Award 2010 Silver Medal International Inventions Geneva FullProtect

    Interview of Christine Bernard by Gary Miliefsky of cyber defense magazine

    Interview of Christine Bernard by Gary Miliefsky of Cyber Defense Magazine CMD TV CDTV the premier source for il security information USA Freemindtronic Andorra


    Interview of Christine Bernard by Gary Miliefsky of cyber defense magazine

    Freemindtronic – Delivering Privacy Solutions by Uniquely Leveraging Hardware, Software, NFC and Multiple Trust Criteria.

    Interview of Christine Bernard CFO Freemindtronic andorra by Gary Miliefsky publisher of Cyber Defense Magazine TV CDTV during RSA conference Cyber Defense Hotseat.

    Discover the Freemindtronic awards here

     

    Mobility & Telecommuting: How to create a contactless cybersecure computer workstation?

    Mobility & Telecommuting: How to create a contactless cybersecure computer workstation?

    How to create a contactless cybersecure computer workstation with Freemindtronic Andorra’s NFC devices.

    The risk of contamination from Coronavirus COVID-19 has led to increased use of telework. The pandemic quickly imposed global containment of people. Independents, businesses, associations, administrations and communities have had to do everything possible to create jobs in a mobility environment. Unfortunately, this has not always been possible. It has become vital to preserve at least essential professional activities.

    For some, the use of telework may seem temporary. However, the use of this mode of operation could well take hold in the long term, and surely become a norm in the future, beyond the duration of this health crisis.

    Businesses will have reorganized around this new mode of operation and the new constraints associated with the limitation of travel.

    More than a trend, it is a finding according to the survey conducted by Gartner which indicates that 88% of organizations have encouraged, or obliged, the use of telework. (https://www.gartner.com/en/newsroom/press-releases/2020-03-19-gartner-hr-survey-reveals-88–of-organizations-have-e)

    According to the French Ministry of Labour, more than 4 out of 10 jobs in the private sector are now compatible with telework. According to a survey conducted by Deskeo among 2,915 professionals spread throughout France 62% of respondents will want to do more telework after confinement. (https://www.ledauphine.com/magazine-lifestyle/2020/04/24/les-francais-voudront-faire-plus-de-teletravail-apres-le-confinement).

    A lot of organizations that have had to telework are done urgently. Some were put in place “remotely” with confined employees and without control of the security measures to be implemented. They have an obligation to find solutions to adequately protect information systems.

    More worryingly, in an emergency, it was not possible for companies to deploy the necessary means and equipment to implement this new mode of operation. In fact, telework is often carried out with the personal equipment of employees with a level of safety not in accordance with professional use. This increases the area of exposure to vulnerability to data security and integrity.

    Cyber criminals take advantage of telework vulnerability

    Cyber criminals, on the other hand, have properly assessed this situation. They have seen exceptional potential and are taking advantage of this windfall to increase and target their cyberattacks.

    A very worrying, dual-effect situation related to the containment and return of people to the company with their data exposed to risks.

    @INTERPOL states that “Cybercriminals are attacking the computer networks and systems of individuals, businesses and even global organizations at a time when cyber defences could be reduced as a result of refocusing attention on the health crisis at COVID-19.” (https://www.interpol.int/Crimes/Cybercrime/COVID-19-cyberthreats)

    Recommendations from Interpol and ANSSI  

    Interpol’s first recommendation is to back up all important files and store them independently of your computer system (e.g. in the cloud or on an external disk). Their second recommendation is to always check that you are on a company’s legitimate website before entering login information or sensitive information. When it comes to prevention, Interpol advises updating your passwords and making sure they are strong enough with a mix of capital letters, lower cases, numbers and special characters.

    @ANSSI published its Computer Security Recommendations for Telework in Crisis on 23 March 2020. ( (https://www.cybermalveillance.gouv.fr/tous-nos-contenus/actualites/recommandations-securite-informatique-teletravail))

    Their first recommendation “Separate professional and personal practices well at the risk of confusing them and generating security errors that could be detrimental to his business.” Second, “Strictly apply the safety instructions of your business.” Other common recommendations follow, such as “Strengthen password security” and “Save your work regularly,” including on media outside your equipment (key or USB drive) that you unplug once you’ve backed up.”

    In France, Prime Minister Édouard Philippe called “emphatically” on all French companies to maintain telework as much as possible for their employees.

    Minister of Labour @MurielPénicaud recommends the use of telework until the summer

    “… 5 million French people are now teleworking, and in the context of progressive deconfining, it is important that they continue to telework…”

    Innovative backup solutions on fixed and removable media that self-disconnect

    There are two secure contactless products that originally have a physical self-disconnection system from computer systems when backup is made. These are the NFC hardened USB stick EviKey and the Sata III EviDisk SSD disc available in the USB 3.0 external case and the internal 7mm 2.5″ format. Products developed by Andorran Freemindtronic SL.

    Check out the demo in the video below the contactless unlocking of an EviDisk built into a company’s KUBB computer Bleujour.

    During the Occitanie CyberMatines on LMI TV @lemondeinformatique april 22, 2020, Fullsecure conducted offline protection and physical use demonstrations of sensitive data such as passwords and encryption keys. The backup media in credit card or Tag formats operate without contact with a phone serving as an NFC terminal.

    This demo shows an electronic self-connection system to a computer, a motherboard Bios, a Windows session and a VPN.

    Retrocompatible solutions for offline encryption of any type of data on computer and phone

    Another demo shows how to encrypt any data on computer and smartphone, an operation compatible with all computer systems and messaging services, including SMS.

    We are talking about compatible retro solutions that offer the advantage of securing the use of any type of computer hardware, computer, smartphone, software, application while maintaining maximum security of the use of sensitive data, whether personal or professional.

    Finally, Fullsecure gives a tip to make a desktop “smart”: Secure the sensitive data of any computer discreetly, discreetly, thanks to its mini devices hardened in Pin’s format.

    In addition, data sharing is contactless, reducing the risk of contagion during this period of pandemic due to Covid19. Indeed, it is enough to approach your smartphone to the Fullsecure device to manage and use the data contained in pin’s.

    Fullsecure offers a wide range of products to meet data security needs in mobility and/or in the workplace.

    Learn more about Fullsecure products https://fullsecure.link

    List of Winners Global Infosec Awards 2021

    List of Winners Global Infosec Awards 2021

    List of Winners Global Infosec 2021 publié sur le site web de CYBER DEFENSE MAGAZINE

    • Access Control Hot Company Safe-T
    • Access Control Market Leader SailPoint
    • Access Control Cutting Edge Sphere
    • Access Control Next-Gen vArmour
    • Account Takeover Protection Most Innovative NuData Security, a Mastercard company
    • Active Directory Security Hot Company Attivo Networks
    • Active Directory Security Next-Gen CionSystems Inc.
    • Advanced Persistent Threat (APT) Detection and Response Editor’s Choice BedRock Systems Inc.
    • Advanced Persistent Threat (APT) Detection and Response Best Product SECUINFRA GmbH
    • Advanced Persistent Threat (APT) Detection and Response Market Leader Group-IB
    • Advanced Persistent Threat (APT) Detection and Response Cutting Edge ARIA Cybersecurity
    • Anti-Malware Best Product Ericom Software
    • Anti-Phishing Most Innovative Ericom Software
    • Anti-Phishing Cutting Edge Inspired eLearning, LLC.
    • Anti-Phishing Hot Company IRONSCALES
    • Anti-Phishing Market Leader KnowBe4
    • Anti-Phishing Next-Gen OnDMARC by Red Sift
    • Anti-Phishing Editor’s Choice SlashNext
    • API Security Most Innovative Salt Security
    • Application Digital Resiliency Solution Most Innovative A10 Networks
    • Application Security Market Leader Checkmarx
    • Application Security Hot Company Contrast Security
    • Application Security Cutting Edge Data Theorem
    • Application Security Editor’s Choice Denim Group
    • Application Security Hot Company Digital.ai
    • Application Security Publisher’s Choice  ForAllSecure
    • Application Security Most Promising HUMAN
    • Application Security Next-Gen Imvision
    • Application Security Cutting Edge Invicti Security
    • Application Security Most Innovative Security Compass
    • Application Security Editor’s Choice vArmour
    • Application Security Next-Gen Verimatrix
    • Application Security Best Product WhiteHat Security
    • Application Security Cutting Edge ZeroNorth
    • Application-aware Workload Protection Hot Company Virsec Systems
    • Artificial Intelligence Market Leader BlackBerry
    • Artificial Intelligence and Machine Learning Best Product Darktrace Holdings Limited
    • Artificial Intelligence and Machine Learning Editor’s Choice Egress
    • Artificial Intelligence and Machine Learning Next-Gen IDology
    • Artificial Intelligence and Machine Learning Cutting Edge LexisNexis Risk Solutions
    • Artificial Intelligence and Machine Learning Hot Company Onfido
    • Artificial Intelligence and Machine Learning Publisher’s Choice  Persona
    • Artificial Intelligence and Machine Learning Cutting Edge Silobreaker
    • Attack Surface Management Publisher’s Choice  Censys
    • Attack Surface Management Cutting Edge Cyberpion
    • Attack Surface Management Cutting Edge Data Theorem
    • Attack Surface Management Next-Gen Intelligent Waves
    • Attack Surface Management Editor’s Choice Randori
    • Attack Surface Management Most Innovative Sweepatic
    • Attack Surface Management Hot Company Zentera Systems, Inc.
    • Attack Surface Management Next-Gen Zscaler
    • Attack Surface Protection Market Leader CyCognito
    • Authentication (Multi, Single or Two-Factor) Most Innovative LexisNexis Risk Solutions
    • Automated Detection Engineering Most Innovative Anvilogic
    • Automated Forensic Malware Analysis and Hunt Tool Cutting Edge Cythereal
    • Biometrics Next-Gen iProov
    • Biometrics Most Innovative Nuance Communications, Inc.
    • Blockchain Security Next-Gen 1Kosmos
    • Breach & Attack Simulation Cutting Edge Cymulate
    • Breach & Attack Simulation Hot Company Keysight Technologies
    • Breach & Attack Simulation Most Innovative Pcysys
    • Breach & Attack Simulation Editor’s Choice Picus Security
    • Breach & Attack Simulation Next-Gen SafeBreach Inc
    • Browser Isolation Most Innovative Proofpoint
    • BYOD Cutting Edge Hypori Inc.
    • Central Log Management Market Leader Fluency Security
    • CEO of the Year Kevin Gosschalk Arkose Labs
    • CEO of the Year Klaus Oestermann BedRock Systems Inc.
    • CEO of the Year Mr. Cesar Pie CSIOS Corporation
    • CEO of the Year Tony Velleca CyberProof
    • CEO of the Year Dr. Aleksandr Yampolskiy SecurityScorecard
    • CEO of the Year Jay Chaudhry Zscaler
    • CEO of the Year Prakash Panjwani WatchGuard Technologies
    • CIEM Hot Company Attivo Networks
    • CISO of the Year Mike Hamilton Critical Insight, Inc
    • CISO of the Year Ryan Weeks Datto
    • Classification and Risk Mapping Cutting Edge Ground Labs
    • Cloud Access Security Broker (CASB) Next-Gen Netskope
    • Cloud Backup Most Innovative Arcserve
    • Cloud Infrastructure Entitlement Management (CIEM) Hot Company Attivo Networks
    • Cloud Infrastructure Entitlement Management (CIEM) Best Product CloudKnox Security
    • Cloud Infrastructure Entitlement Management (CIEM) Hot Company Ermetic
    • Cloud Security Editor’s Choice Anitian
    • Cloud Security Publisher’s Choice  ARMO
    • Cloud Security Cutting Edge Censys
    • Cloud Security Most Innovative Data Theorem
    • Cloud Security Most Innovative Lookout
    • Cloud Security Best Product Netskope
    • Cloud Security Most Promising Orca Security
    • Cloud Security Market Leader RedSeal
    • Cloud Security Next-Gen Sonrai Security
    • Cloud Security Most Innovative ThreatModeler Software Inc.
    • Cloud Security Next-Gen Valtix
    • Cloud Security Hot Company vArmour
    • Cloud Security Cutting Edge Volterra
    • Cloud Security Market Leader Zscaler
    • Cloud Security Automation Hot Company Anitian
    • Cloud Workload Protection Hot Company ARMO
    • Cloud Workload Protection Next-Gen ColorTokens
    • Cloud Workload Protection Editor’s Choice Confluera
    • Cloud Workload Protection Cutting Edge TrueFort
    • Cloud Workload Protection Most Innovative Virsec Systems
    • Cloud Workload Protection Best Product Zscaler
    • Compliance Market Leader A-LIGN
    • Compliance Next-Gen Anitian
    • Compliance Most Innovative Armor
    • Compliance Cutting Edge Atlantic.Net
    • Compliance Best Product BigID
    • Compliance Most Promising Delphix
    • Compliance Publisher’s Choice  Reciprocity
    • Compliance Most Innovative SberBank
    • Compliance Editor’s Choice Spirion
    • Compliance Hot Company Strike Graph
    • Compliance Cutting Edge Tugboat Logic
    • Compliance Automation Cutting Edge Anitian
    • Consent & Preference Management Market Leader OneTrust PreferenceChoice
    • Container Security Most Innovative NeuVector
    • Container Security  Hot Company Virsec Systems
    • Continuous Controls Monitoring Platform Best Product Panaseer
    • Continuous Improvement and Optimization Services  Hot Company CSIOS Corporation
    • Converged IAM Most Innovative ILANTUS TECHNOLOGIES
    • Critical Infrastructure Protection Cutting Edge BedRock Systems Inc.
    • Critical Infrastructure Protection Next-Gen QOMPLX
    • Critical Infrastructure Protection Most Innovative TXOne Networks, Inc.
    • Crypto Security Next-Gen FREEMINDTRONIC
    • Crypto Security Cutting Edge SpyCloud
    • CTO of the Year  Charles Eagan Blackberry
    • CTO of the Year Satya Gupta Virsec Systems
    • Cyber Analytics  Most Innovative Cyberlumeneer
    • Cyber Insurance Editor’s Choice Cowbell Cyber
    • Cyber Threat Intelligence Most Innovative CYFIRMA
    • Cyber Threat Intelligence Best Product Nucleon Cyber
    • Cybersecurity – Healthcare Practices Market Leader Alexio Corporation
    • Cybersecurity Analytics Most Innovative Awake Security
    • Cybersecurity Analytics Cutting Edge ChaosSearch
    • Cybersecurity Analytics Next-Gen LexisNexis Risk Solutions
    • Cybersecurity Analytics Hot Company Spirion
    • Cybersecurity Artificial Intelligence Editor’s Choice Axiado Corporation
    • Cybersecurity Artificial Intelligence Next-Gen Traceable
    • Cybersecurity Artificial Intelligence  Market Leader Darktrace Holdings Limited
    • Cybersecurity Conference   Cutting Edge Semperis
    • Cybersecurity Discovery  Most Innovative Suridata.ai
    • Cybersecurity Education – for Enterprises Hot Company Inspired eLearning, LLC.
    • Cybersecurity Education – for Enterprises Editor’s Choice AwareGO
    • Cybersecurity Education – for Small Business Next-Gen Alexio Corporation
    • Cybersecurity Education – for Small Business Most Innovative Inspired eLearning, LLC.
    • Cybersecurity Innovation Market Leader ANY.RUN
    • Cybersecurity Internet of Things (IoT) Hot Company Onward Security Corp.
    • Cybersecurity Internet of Things (IoT)  Best Product Armis
    • Cybersecurity Internet of Things (IoT)  Cutting Edge Cujo AI
    • Cybersecurity Product Engineeering Services Hot Company Sacumen
    • Cybersecurity Research Most Innovative BlackBerry
    • Cybersecurity Startup of the Year Editor’s Choice Anvilogic
    • Cybersecurity Startup of the Year Publisher’s Choice  BedRock Systems Inc.
    • Cybersecurity Startup of the Year Cutting Edge Cydome Security
    • Cybersecurity Startup of the Year Best Product Cymptom
    • Cybersecurity Startup of the Year Most Promising Cyolo
    • Cybersecurity Startup of the Year Most Innovative DoControl, Inc.
    • Cybersecurity Startup of the Year Next-Gen Keyavi Data Corp.
    • Cybersecurity Startup of the Year Hot Company Salt Security
    • Cybersecurity Startup of the Year Cutting Edge SecurityScorecard
    • Cybersecurity Startup of the Year Next-Gen Stellar Cyber
    • Cybersecurity Strategist of the Year Mr. Clinton Hackney CSIOS Corporation
    • Cybersecurity Training Best Product Checkmarx
    • Cybersecurity Training Cutting Edge Circadence Corporation
    • Cybersecurity Training Next-Gen Fortinet
    • Cybersecurity Training Editor’s Choice Inspired eLearning, LLC.
    • Cybersecurity Training Market Leader KnowBe4
    • Cybersecurity Training Most Innovative MITRE Engenuity
    • Cybersecurity Training Most Promising PECB
    • Cybersecurity Training Market Leader RangeForce
    • Cybersecurity Training for Infosec Professionals Best Product Infosec Inc.
    • Cybersecurity-as-a-Service (CaaS) Next-Gen Allot
    • Cybersecurity-as-a-Service (CaaS) Cutting Edge Cyvatar
    • Data Center Security Market Leader HillStone Networks
    • Data Governance Most Innovative Egnyte
    • Data Leakage Protection Most Innovative Dasera
    • Data Loss Prevention (DLP) Next-Gen Altaro Software
    • Data Loss Prevention (DLP) Cutting Edge CoSoSys
    • Data Loss Prevention (DLP) Editor’s Choice DTEX Systems
    • Data Loss Prevention (DLP) Best Product GTB Technologies, Inc.
    • Data Loss Prevention (DLP) Market Leader Kingston Technology
    • Data Protection Next-Gen ICSDI – ATAGUC SAFE
    • Data Recovery Publisher’s Choice  Rubrik
    • Data Recovery Market Leader SecureData
    • Data Security Best Product BigID
    • Data Security Cutting Edge Cloudrise
    • Data Security Next-Gen Concentric.ai
    • Data Security Next-Gen Egnyte
    • Data Security Market Leader Imperva
    • Data Security Hot Company Keyavi Data Corp.
    • Data Security Most Promising PKWARE
    • Data Security Market Leader Protegrity
    • Data Security Most Innovative RackTop Systems
    • Data Security Publisher’s Choice  Suridata.ai
    • Database Data Breach Prevention Cutting Edge Don’t Be Breached
    • DDoS Protection Scrubbing Center Solution Next-Gen A10 Networks
    • Deception Based Security Market Leader Attivo Networks
    • Deception Based Security Most Innovative Illusive Networks
    • Deep Sea Phishing Next-Gen Ericom Software
    • Deep Sea Phishing Cutting Edge IRONSCALES
    • Deep Sea Phishing Editor’s Choice Tessian
    • Defensive Cyberspace Operations Team of the Year  Publisher’s Choice  CSIOS Corporation
    • DevSecOps Cutting Edge Apiiro
    • DevSecOps Editor’s Choice Data Theorem
    • DevSecOps Most Innovative Denim Group
    • DevSecOps Next-Gen Security Compass
    • DevSecOps Hot Company ZeroNorth
    • Digital Executive Protection Editor’s Choice BlackCloak, Inc.
    • Digital Footprint Security Next-Gen Reflectiz
    • Digital Footprint Security Cutting Edge Resecurity, Inc.
    • Digital Footprint Security Editor’s Choice Spirion
    • Digital Footprint Security Publisher’s Choice  Sweepatic
    • Digital Rights Management Next-Gen Fasoo Co., Ltd.
    • Digital Rights Management Most Innovative i2Chain, Inc.
    • Email Fraud Defense Market Leader Proofpoint
    • Email Security Cutting Edge Microsoft
    • Email Security Most Innovative RevBits LLC
    • Email Security and Management Editor’s Choice Cryptoloc Technology
    • Email Security and Management Best Product Darktrace Holdings Limited
    • Email Security and Management Next-Gen Datto
    • Email Security and Management Cutting Edge IRONSCALES
    • Email Security and Management Market Leader OnDMARC by Red Sift
    • Email Security and Management Publisher’s Choice Perception Point
    • Email Security and Management Market Leader Proofpoint
    • Email Security and Management Hot Company Zix
    • Embedded Security Editor’s Choice Enea
    • Embedded Security Next-Gen Intrinsic ID
    • Embedded Security Cutting Edge Lattice Semiconductor
    • Encrypted Hardware Next-Gen DataLocker
    • Encrypted Hardware Best Product iStorage
    • Encrypted Hardware Most Innovative SecureData
    • Encryption Next-Gen Cryptoloc Technology
    • Encryption Market Leader Kingston Technology
    • Encryption Best Product Quantum Xchange
    • Encryption Cutting Edge RackTop Systems
    • Encryption Editor’s Choice SafeLogic
    • Encryption Hot Company Zoom Video Communications, Inc.
    • Endpoint Detection and Response (EDR) Most Innovative RevBits LLC
    • Endpoint Security Next-Gen Adaptiva
    • Endpoint Security Best Product BlackBerry
    • Endpoint Security Market Leader DriveLock SE
    • Endpoint Security Most Innovative Keeper Security
    • Endpoint Security Cutting Edge McAfee
    • Endpoint Security Market Leader Microsoft
    • Endpoint Security Editor’s Choice RevBits LLC
    • Endpoint Security Cutting Edge SecPod
    • Endpoint Security Most Innovative VMware Carbon Black
    • Endpoint Security Market Leader Zscaler
    • Enterprise Security Publisher’s Choice  Anitian
    • Enterprise Security Cutting Edge Anvilogic
    • Enterprise Security Hot Company Darktrace Holdings Limited
    • Enterprise Security Editor’s Choice ThreatQuotient
    • Enterprise Security Next-Gen vArmour
    • ERP Data Security  Next-Gen Appsian
    • ERP Risk Mitigation Cutting Edge Appsian
    • ERP Security Most Innovative Onapsis
    • Extended Detection and Response (XDR) Most Innovative Beijing ThreatBook Technology Co. Ltd.
    • Extended Detection and Response (XDR) Market Leader McAfee
    • Extended Detection and Response (XDR) Editor’s Choice Microsoft
    • Extended Detection and Response (XDR) Cutting Edge SANGFOR TECHNOLOGIES INC.
    • Extended Detection and Response (XDR) Next-Gen Zentera Systems, Inc.
    • Firewall Market Leader VMware
    • Firewall Best Product Untangle Inc
    • Forensics Most Innovative QuoLab Technologies
    • Fraud Prevention Hot Company Arkose Labs
    • Fraud Prevention Editor’s Choice Bolster
    • Fraud Prevention Publisher’s Choice  Deduce
    • Fraud Prevention Cutting Edge Group-IB
    • Fraud Prevention Next-Gen Kount, An Equifax Company
    • Fraud Prevention Hot Company LexisNexis Risk Solutions
    • Fraud Prevention Most Innovative Pindrop
    • Fraud Prevention Editor’s Choice SberBank
    • Fraud Prevention Hot Company Sumsub
    • Fraud Prevention Next-Gen Veriff
    • Fraud Prevention Best Product XTN Cognitive Security
    • Global Managed Threat Detection and Response Market Leader Trustwave
    • Go-to-market Agency for Cyber Security Startups Most Innovative Punch
    • Governance, Risk and Compliance (GRC)  Best Product Difenda
    • Hardware Password Manager Most Innovative FREEMINDTRONIC
    • Hardware Security Best Product Microsoft
    • Healthcare IoT Security Cutting Edge CyberMDX
    • Healthcare IoT Security Most Innovative Medigate
    • IAM Hot Company Keeper Security
    • IAM Service Market Leader Herjavec Group
    • ICS/SCADA Security Next-Gen Armis
    • ICS/SCADA Security Hot Company Mission Secure
    • ICS/SCADA Security Editor’s Choice TXOne Networks, Inc.
    • ICS/SCADA Security  Market Leader SCADAfence
    • Identity & Access Management Hot Company Axiad
    • Identity & Access Management Editor’s Choice Centrify
    • Identity & Access Management Market Leader CloudKnox Security
    • Identity & Access Management Next-Gen Devolutions
    • Identity & Access Management Cutting Edge HID Global
    • Identity & Access Management Publisher’s Choice  Omada
    • Identity & Access Management Cutting Edge One Identity
    • Identity & Access Management Most Innovative OneLogin, Inc.
    • Identity & Access Management Best Product Optimal IdM
    • Identity & Access Management Most Promising Ping Identity
    • Identity & Access Management Most Innovative QOMPLX
    • Identity & Access Management Next-Gen Saviynt
    • Identity & Access Management Cutting Edge Semperis
    • Identity & Access Management Editor’s Choice SpyCloud
    • Identity Management Cutting Edge Clear Skye
    • Identity Management Best Product SailPoint
    • Identity Management Next-Gen Sonrai Security
    • Identity Management Cutting Edge vArmour
    • Identity Management Market Leader Venafi
    • Identity Verification Cutting Edge Persona
    • Identity Verification Editor’s Choice Veratad Technologies LLC
    • Identity Verification  Most Innovative IDology
    • Identity Verification  Next-Gen Regula
    • Incident Response Editor’s Choice Canopy Software
    • Incident Response Most Innovative Endace
    • Incident Response Next-Gen Group-IB
    • Incident Response Cutting Edge Logsign
    • Incident Response Publisher’s Choice  OTRS Group
    • Incident Response Hot Company QuoLab Technologies
    • Incident Response Most Promising SIRP Labs Limited
    • InfoSec Startup of the Year Next-Gen Clayton
    • InfoSec Startup of the Year Cutting Edge Hysolate
    • InfoSec Startup of the Year Most Innovative King & Union
    • Infosec Startup of the Year Editor’s Choice ShardSecure
    • Insider Threat Detection Market Leader Code42
    • Insider Threat Detection Best Product LinkShadow
    • Insider Threat Prevention Next-Gen DTEX Systems
    • Insider Threat Prevention Cutting Edge Egress
    • Insider Threat Prevention Best Product Gurucul
    • Insider Threat Prevention Most Innovative RackTop Systems
    • Integrated Risk Management  Editor’s Choice CyberSaint Security
    • Internet Filtering Market Leader SafeDNS, Inc.
    • Internet of Things (IoT) Hot Company SCADAfence
    • Intrusion Detection System Most Innovative INTRUSION
    • IT Automation and Cybersecurity Next-Gen Coviant Software
    • IT Vendor Risk Management (ITVRM)  Cutting Edge LogicGate
    • IT Vendor Risk Management (ITVRM)  Editor’s Choice ProcessUnity
    • IT Vendor Risk Management (ITVRM)  Most Innovative Reciprocity
    • Malware Analysis Next-Gen ANY.RUN
    • Malware Analysis Best Product ReversingLabs
    • Malware Detection Most Innovative Microsoft
    • Managed Detection and Response (MDR) Best Solution Alert Logic
    • Managed Detection and Response (MDR) Market Leader AT&T Cybersecurity
    • Managed Detection and Response (MDR) Editor’s Choice Critical Insight, Inc
    • Managed Detection and Response (MDR) Cutting Edge CyberProof
    • Managed Detection and Response (MDR) Market Leader deepwatch
    • Managed Detection and Response (MDR) Next-Gen Difenda
    • Managed Detection and Response (MDR) Most Innovative eSentire
    • Managed Detection and Response (MDR) Hot Company Field Effect Software, Inc
    • Managed Detection and Response (MDR) Market Leader Herjavec Group
    • Managed Detection and Response (MDR) Most Innovative Netsurion
    • Managed Detection and Response (MDR) Publisher’s Choice  Orange Cyberdefense
    • Managed Security Service Provider (MSSP) Next-Gen Avertium
    • Managed Security Service Provider (MSSP) Cutting Edge CyberProof
    • Managed Security Service Provider (MSSP) Best Product deepwatch
    • Managed Security Service Provider (MSSP) Market Leader Herjavec Group
    • Managed Security Service Provider (MSSP) Market Leader Neustar Inc.
    • Managed Security Service Provider (MSSP) Editor’s Choice Orange Cyberdefense
    • Managed Security Service Provider (MSSP) Most Innovative Thrive
    • MDR Service Provider Most Innovative Proficio
    • Micro-segmentation Next-Gen ColorTokens
    • Micro-segmentation Cutting Edge Ericom Software
    • Micro-segmentation Most Innovative Illumio
    • Micro-segmentation Best Product Safe-T
    • Micro-segmentation Editor’s Choice Zentera Systems, Inc.
    • Mobile Application Security Most Innovative Guardsquare
    • Mobile Endpoint Security Next-Gen Guardsquare
    • Mobile Endpoint Security Market Leader Lookout
    • MSSP Best Product AT&T Cybersecurity
    • MSSP Cutting Edge Netsurion
    • MSSP Most Innovative QI-ANXIN Technology Group Inc
    • Multi-factor Authentication Hot Company Axiad
    • Multi-factor Authentication Most Innovative LastPass
    • Multi-factor Authentication Market Leader WatchGuard Technologies
    • Network & Security Management Next-Gen Untangle Inc
    • Network Access Control (NAC) Cutting Edge Portnox
    • Network Detection and Response  Most Innovative Plixer
    • Network Security and Management Cutting Edge AlgoSec
    • Network Security and Management Most Innovative ARIA Cybersecurity
    • Network Security and Management Next-Gen Endace
    • Network Security and Management Market Leader Gigamon
    • Network Security and Management Best Product LogRhythm
    • Network Security and Management Publisher’s Choice Lookout
    • Network Security and Management Hot Company WatchGuard Technologies
    • Network Security and Management Editor’s Choice Zero Networks
    • Next Generation Firewall Most Innovative HillStone Networks
    • Open-Source Security Next-Gen Onward Security Corp.
    • Open-Source Security Cutting Edge Patchstack
    • Open-Source Security Next-Gen Xmirror Security
    • Operational Technology (OT) & Internet of Things (IoT) Cybersecurity Market Leader Nozomi Networks
    • Packet Capture Platform Market Leader Endace
    • PAM for Cloud Infrastructure Best Product CloudKnox Security
    • Passwordless Authentication Best Product Aware, Inc.
    • Passwordless Authentication Most Innovative Axiad
    • Passwordless Authentication Cutting Edge TruU
    • Passwordless Authentication Next-Gen Veridium
    • Pentesting-as-a-service (PtaaS) Next-Gen Cobalt
    • PR Firm for InfoSec Companies Publisher’s Choice  ARPR
    • PR Firm for InfoSec Companies Hot Company LaunchTech Communications
    • PR Firm for InfoSec Companies Market Leader Lumina Communications
    • Privacy Management Software Editor’s Choice IDX
    • Privacy Management Software Next-Gen Spirion
    • Privacy Management Software Cutting Edge TrustArc
    • Privacy Research Solution Most Innovative OneTrust DataGuidance
    • Privileged Access Management (PAM) Next-Gen Fudo Security
    • Privileged Access Management (PAM) Best Product RevBits LLC
    • Privileged Account Security Most Innovative Devolutions
    • Privileged Account Security Market Leader Remediant
    • Railway Cybersecurity Cutting Edge Cervello
    • Ransomless Ransomware Solution Most Innovative Stash Global Inc.
    • Ransomware Protection of SaaS Data Next-Gen Spin Technology, Inc.
    • Ransomware Recovery Solution Cutting Edge Semperis
    • Risk Management Editor’s Choice CyberSaint Security
    • Risk Management Cutting Edge Reciprocity
    • Risk Management Best Product RiskIQ
    • Risk Management  Next-Gen RiskLens
    • Runtime Memory Protection Best Product Virsec Systems
    • SaaS Security Publisher’s Choice  DoControl, Inc.
    • SaaS/Cloud Security Publisher’s Choice  ANY.RUN
    • SaaS/Cloud Security Editor’s Choice Axis Security
    • SaaS/Cloud Security Cutting Edge Beijing ThreatBook Technology Co. Ltd.
    • SaaS/Cloud Security Most Promising Clayton
    • SaaS/Cloud Security Publisher’s Choice  ColorTokens
    • SaaS/Cloud Security Next-Gen ExtraHop
    • SaaS/Cloud Security Market Leader iboss
    • SaaS/Cloud Security Hot Company Lightspin
    • SaaS/Cloud Security Cutting Edge ManagedMethods
    • SaaS/Cloud Security Next-Gen Spin Technology, Inc.
    • SaaS/Cloud Security Editor’s Choice Webscale
    • SaaS/Cloud Security Best Product Zscaler
    • SaaS/Cloud Security  Most Innovative Anitian
    • SD-WAN Cutting Edge HillStone Networks
    • SecOps-as-a-service Most Innovative Cyvatar
    • Secrets Management Next-Gen FREEMINDTRONIC
    • Secure Coding: Developer Upskilling  Most Innovative Secure Code Warrior
    • Secure Communications Best Product BlackBerry
    • Secure Remote Access Next-Gen Fudo Security
    • Secure SaaS Backups Most Innovative Spin Technology, Inc.
    • Security Awareness Training Market Leader Infosec
    • Security Awareness Training Editor’s Choice Proofpoint
    • Security Company of the Year Publisher’s Choice  Anitian
    • Security Company of the Year Market Leader BlackBerry
    • Security Company of the Year Hot Company ColorTokens
    • Security Company of the Year Market Leader Darktrace Holdings Limited
    • Security Company of the Year Editor’s Choice Egress
    • Security Company of the Year Editor’s Choice eSentire
    • Security Company of the Year Most Innovative Herjavec Group
    • Security Company of the Year Cutting Edge Keeper Security
    • Security Company of the Year Next-Gen Lookout
    • Security Company of the Year Cutting Edge Raytheon Intelligence & Space
    • Security Company of the Year Next-Gen ReversingLabs
    • Security Company of the Year Most Promising SANGFOR TECHNOLOGIES INC.
    • Security Company of the Year Most Innovative Zscaler
    • Security Expert of the Year Caroline Wong Cobalt
    • Security Expert of the Year Stuart Reed Orange Cyberdefense
    • Security Governance, Risk and Compliance (GRC) Market Leader SCADAfence
    • Security Information Event Management (SIEM) Cutting Edge Devo
    • Security Information Event Management (SIEM) Editor’s Choice Graylog
    • Security Information Event Management (SIEM) Best Product LogRhythm
    • Security Information Event Management (SIEM) Publisher’s Choice  SECUINFRA GmbH
    • Security Information Event Management (SIEM) Most Innovative Securonix
    • Security Information Event Management (SIEM) Next-Gen Sumo Logic
    • Security Information Event Management (SIEM) Hot Company Thrive
    • Security Investigation Platform Next-Gen Endace
    • Security Investigation Platform Cutting Edge King & Union
    • Security Investigation Platform Most Innovative Swimlane
    • Security Investigation Platform Best Product ThreatQuotient
    • Security Project of the Year Most Innovative BedRock Systems Inc.
    • Security Project of the Year Cutting Edge SberBank
    • Security Project of the Year  Editor’s Choice Zscaler
    • Security Ratings Cutting Edge Panorays
    • Security Ratings Next-Gen RiskRecon, A Mastercard Company
    • Security Software Most Innovative Versa Networks
    • Security Team of the Year Most Innovative Bank of America
    • Security Team of the Year Most Innovative SecurityMetrics
    • Security Training Best Product Field Effect Software, Inc
    • Self-protecting Data Security Cutting Edge Cryptoloc Technology
    • Self-protecting Data Security Next-Gen Keyavi Data Corp.
    • SIEM Most Innovative Logsign
    • Single Sign-on Best Product CionSystems Inc
    • SMB Cybersecurity Editor’s Choice A-LIGN
    • SMB Cybersecurity Best Product Defendify
    • SMB Cybersecurity Next-Gen Devolutions
    • SMB Cybersecurity Most Innovative Field Effect Software, Inc
    • SMB Cybersecurity Cutting Edge JumpCloud
    • SMB Cybersecurity Publisher’s Choice  Orange Business Service
    • SMB Cybersecurity Most Innovative Sectigo
    • SMB Cybersecurity Most Promising TPx
    • SMB Cybersecurity Market Leader WatchGuard Technologies
    • SMB Cybersecurity Cutting Edge Zix
    • SOAR Best Product QI-ANXIN Technology Group Inc
    • SOAR Next-Gen Siemplify
    • SOC-as-a-Service Next-Gen Comtact
    • SOC-as-a-Service Most Innovative Netsurion
    • SOC-as-a-Service Cutting Edge Performanta
    • SOC-as-a-Service Best Product Proficio
    • Software Composition Analysis Cutting Edge Checkmarx
    • Software Composition Analysis Next-Gen GrammaTech
    • Software Development Lifecycle Security Cutting Edge Clayton
    • Telecoms Fraud Prevention Next-Gen SpyCloud
    • Telecoms Fraud Protection Best Product LexisNexis Risk Solutions
    • Third Party Risk Management (TPRM) Best Product CyberGRX
    • Third Party Risk Management (TPRM) Cutting Edge ProcessUnity
    • Third Party Risk Management (TPRM) Most Innovative Reciprocity
    • Third Party Risk Management (TPRM) Next-Gen Resecurity, Inc.
    • Threat Intelligence Market Leader Alert Logic
    • Threat Intelligence Cutting Edge Cobwebs Technologies
    • Threat Intelligence Editor’s Choice Cyware
    • Threat Intelligence Publisher’s Choice  Flashpoint
    • Threat Intelligence Most Promising King & Union
    • Threat Intelligence Editor’s Choice LexisNexis Risk Solutions
    • Threat Intelligence Next-Gen QuoLab Technologies
    • Threat Intelligence Cutting Edge Resecurity, Inc.
    • Threat Intelligence Most Innovative ReversingLabs
    • Threat Intelligence Next-Gen Silobreaker
    • Threat Intelligence Hot Company ThreatQuotient
    • Threat Intelligence   Best Product Beijing ThreatBook Technology Co. Ltd.
    • Threat Modeling Most Innovative ThreatModeler Software Inc.
    • Token Based IAM Hot Company uQontrol
    • Top Women in Cybersecurity Alex Kobray Flashpoint
    • Top Women in Cybersecurity Kimberly Sutherland LexisNexis Risk Solutions
    • Top Women in Cybersecurity Nicola Jakeman Orange Cyberdefense
    • Top Women in Cybersecurity Aimei Wei Stellar Cyber
    • Top Women in Cybersecurity Michel Huffaker ThreatQuotient
    • Top Women in Cybersecurity  Vanita Pandey Arkose Labs
    • Top Women in Cybersecurity  Carolyn Crandall Attivo Networks
    • Top Women in Cybersecurity  Ingrid Gliottone BlackCloak, Inc.
    • Top Women in Cybersecurity  Christina Luttrell IDology
    • Top Women in Cybersecurity  Leah Freiman ItCon Inc.
    • Top Women in Cybersecurity  Anna Collard KnowBe4
    • Top Women in Cybersecurity  Stephanie Fohn NeuVector
    • Top Women in Cybersecurity  Teresa Shea Raytheon Intelligence & Space
    • Top Women in Cybersecurity  Susanne Gurman SecurityScorecard
    • Top Women in Cybersecurity  Lee Kappon Suridata.ai
    • Top Women in Cybersecurity  Alex Kobray TalaTek, a Cerberus Sentinel company
    • Top Women in Cybersecurity  Dr. Nicole Fern Tortuga Logic, Inc.
    • Unified Cloud Edge (UCE) Security Market Leader McAfee
    • Unified Threat Management (UTM) Cutting Edge WatchGuard Technologies
    • User Behavior Analytics Cutting Edge NuData Security, a Mastercard company
    • Vulnerability Assessment, Remediation and Management Next-Gen Adaptive Shield
    • Vulnerability Assessment, Remediation and Management Cutting Edge Pcysys
    • Vulnerability Assessment, Remediation and Management Hot Company SecPod
    • Vulnerability Assessment, Remediation and Management Hot Company SecureWorks
    • Vulnerability Assessment, Remediation and Management Most Innovative SecurityMetrics
    • Vulnerability Assessment, Remediation and Management Best Product XM Cyber
    • Vulnerability Intelligence Cutting Edge Risk Based Security
    • Vulnerability Intelligence Most Innovative RiskSense
    • Vulnerability Intelligence Editor’s Choice Silobreaker
    • Vulnerability Management Publisher’s Choice  Denim Group
    • Vulnerability Management Most Promising Difenda
    • Vulnerability Management Next-Gen Intel
    • Vulnerability Management Cutting Edge Kenna Security
    • Vulnerability Management Most Innovative Pcysys
    • Vulnerability Management Next-Gen RiskSense
    • Vulnerability Management Next-Gen Skybox Security
    • Vulnerability Management (Operational Technology) Hot Company Industrial Defender
    • Web Application Security Publisher’s Choice  Fastly (Signal Sciences)
    • Web Application Security Next-Gen HUMAN
    • Web Application Security Next-Gen Invicti Security
    • Web Application Security Editor’s Choice Kasada
    • Web Application Security Market Leader Neustar Inc.
    • Web Application Security Cutting Edge Patchstack
    • Web Application Security Most Innovative Penta Security Systems Inc.
    • Web Application Security Hot Company Reblaze
    • Web Application Security Most Promising Reflectiz
    • Web Application Security Best Product ThreatX
    • Wireless, Mobile, or Portable Device Security Next-Gen WatchGuard Technologies
    • Wireless, Mobile, or Portable Device Security  Most Innovative Kingston Technology
    • XDR – Extended Detection and Response Cutting Edge Confluera
    • XDR – Extended Detection and Response Best Product Fidelis Cybersecurity
    • XDR – Extended Detection and Response Next-Gen Red Piranha Limited
    • XDR – Extended Detection and Response Most Innovative Stellar Cyber
    • Zero Trust Hot Company Fudo Security


    Three Awards 2021

    Freemindtronic win awards 2021 Next-Gen in Secrets Management with EviCypher & EviToken Technologies


    Freemindtronic win awards 2021 Most Innovative in Hardware Password Manager with EviCypher & EviToken Technologies


    Freemindtronic Win Awards 2021 Next-Gen in Crypto Security with EviCypher & EviToken Technologies



    NEWS PROVIDED BY
    https://cyberdefenseawards.com
    May 18, 2021 , 2020, 09:00 ET
    Related Links
    https://cyberdefenseawards.com/global-infosec-awards-for-2021-winners


    SHARE THIS ARTICLE



    EviCypher A New Way to Keep Secrets and Pass Them On

    EviCypher - EviToken Technology Technology A New Way to Keep Secrets and Pass Them On, multiple trust criteria, password, fingerprint, geolocation, BSSID, ID phone, Sharing Contactless Encryption, MFA, secret management by Freemindtronic Andorra

    EviToken & EviCypher Technology a new way to keep secrets and pass them on.

    EviToken & EviCypher technology to control information privacy is an absolute necessity today, as there are so many cyber malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These so-called “cyber” threats alone represent approximately 75% of the infiltration techniques giving access to your confidential or personal data. All of these techniques have the same approach, which is identity theft. This mechanism allows an individual, or a machine, to impersonate someone or something else. The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.

        Protection techniques for transmitting confidential or personal data have been around for a very long time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with strong encryption (RSA of 2048 or 4096 bits or even ECDSA). Unfortunately, if the model on which these encryption techniques are based is proven and ensures flawless security, its IT implementation is, for its part, often undermined by man-in-the-middle attacks, or by elevations of law on information systems. These attacks, when identification or decryption relies only on one-factor authentication, allow the theft of encryption keys, and directly compromise the security of your data. To mitigate these threats, two-factor authentication (or 2FA) adds a layer of protection by either obtaining a unique code sent by SMS to your phone number, or by validating a request for it authentication (Google / Facebook), or through the use of authenticators which is increasingly recommended by security specialists.

    Why use the EviToken & EviCypher Technology?

                     The purpose of EviToken & EviCypher technology is to secure secrets of different kinds, such as asymmetric keys (RSA), symmetric keys (AES) but also login information, PIN codes, account or bank card identifiers, cryptocurrency private keys, cryptocurrency wallet passphrases, cryptocurrency recovery phrases (SEED), etc. The EviToken & EviCypher secure safe is contained in a simple NFC card, not connected to a computer system. It communicates with the latter, on demand, via a near-field transmission protocol (NFC) which transmits data over an encrypted channel, built by EviToken & EviCypher. Secrets stored in the card are segmented and encrypted to make them physically inaccessible to cybercriminals. The EviToken & EviCypher secure safe is a real natural Air Gap component. Thus, apart from the case of data transmission, the architecture used has: no power supply; no security breach due to an increase in temperature (which makes it immune to malware such as “BitWhisper and Fansmitter”); no emission of sound signals, even those inaudible to the human ear and no emission of light or waves. Finally, to avoid a conflation with smart card-based systems, the support of EviToken & EviCypher technology does not require dedicated physical connection hardware with the digital system, nor does it have an operating system, which makes it insensitive to the introduction of malicious code as on a Java architecture. Like any electronic component, the EviToken & EviCypher secure safe can undergo invasive attacks which consist in using acids to expose the electronic circuit that will then have to be analyzed to try to understand the implementation of the secure secrets in multiple scrambled segments.

    If EviToken & EviCypher technology provides security in a secure vault, what about the use of encryption keys to transport secrets over a secure channel?

    In the context of two-factor authentication, we consider that you are the only one who can hold the second criterion of trust. This security measure traditionally allows, in case of failure, not to trigger the secure transport of your data. However, this function is not intended to secure the transport, it is the role of the encryption protocol to perform this operation. Thus, if the encryption keys are compromised, the data could be compromised during a listen. Faced with this problem, EviToken & EviCypher directly integrates metadata trust criteria into its encryption keys, in order to secure the encrypted messages during their transport. Thus, even in the event of a compromise of the keys, decryption remains blocked by the trust criteria. With this in mind, why stop at two criteria of trust? In its basic version, EviToken & EviCypher offers nine trust criteria based on the possession of a third-party object, technical components (phone ID, barcode, password, geolocation or BSSID) but also environmental and specific components to the sender, or recipient, to make data compromise even more difficult.

                    A simple example, you want to send a confidential message containing your latest invention to a colleague in a hostile environment, with a high probability of compromise. You will therefore add non-digital trust criteria to your encryption key, to ensure its protection in the event of a compromise. The decryption of the message by the AES 256 symmetric key will only be accessible, by the digital tool, once the conditions related to the trust criteria have been met. If we base one of the trust criteria on a geolocation for example, the recipient must not only be in possession of an EviToken & EviCypher card, but also be physically located at the location of geolocation defined in the trust criteria to decrypt the message. This location may be known to the recipient like a convention, but may also not be known. The trust criterion will then be transmitted to him as one of the authentication multi-factors, by SMS / QR Code / Photo or any other means.

    If EviToken & EviCypher technology provides security in a secure safe, encryption of messages with trust criteria based on environmental components, technical or not, what about the transmission of keys for use in a space digital connected?

                    To secure end-to-end transmissions, several tools, used as gateways, such as smartphones or virtual keyboards, will be crossed.  EviToken & EviCypher then builds encrypted channels, from the first communications between the EviToken & EviCypher card and the first NFC communication gateway, using an AES 128 symmetric pairing key. The latter will be replaced by a 256-bit AES symmetric key, with different trust criteria depending on the user’s choice, when recording a secret. Communication with web browsers is achieved using 256-bit ECC ephemeral keys (X25519), to negotiate exchanges between the smartphone and the browser plugin, to insert website authentication, text decryption, etc. As for the transmission, from the smartphone, of texts, images or encrypted files, the encryption is carried out with a symmetric key AES 256 bits with trust criteria.

    Why choose the EviToken & EviCypher technology?

    Our goal is to better understand the feasibility of digital malicious acts through a human approach to attacks. Thus, if you do not physically have the EviToken & EviCypher card, or if you do not have access to it with a connection duration long enough to carry out an attack, it will be very difficult to compromise the safe, but it is quite obvious that «to the impossible no one is bound “. “However, this attack requires physical contact, it is no longer possible to hide behind anonymizers. Assuming that the encrypted message is sufficiently protected, with algorithms such as 2048- or 4096-bit RSA or even ECDSA, then it is necessary to look into the protection of the key. Indeed, this protection will remain true as long as the encryption and decryption keys remain secret. History of computer attacks shows certain difficulties in maintaining this assertion. It is therefore necessary to strengthen the protection of the keys, by accepting the compromise of the latter, while protecting the message during its transport. at best for this requirement, non-digital trust criteria, that is to say criteria known, held, observable or understandable by the recipient, are required for the decryption of the message and no longer of the key.

    EviToken & EviCypher technology, by adding these trust criteria, changes the current paradigm of access to secrets. Thus, even if a secret, and more particularly a decryption key, were stolen, it could only be used if the trust criteria are met.

    Based on the EviToken & EviCypher principle, the new EviCypher technology, which won the 2021 gold medal for international inventions from Geneva, brings new innovations in the creation, management, integration and augmented intelligence linked to the use of trust criteria. A new chapter on this internationally patented invention on segmented key authentication is opening.

    About the author

    fabrice crasnier cybersecurity university professor in france forensic expert of the court of appeal of toulouse in france and former forensic police officerFabrice Crasnier is the director of Research & Development departement of FREEMINDTRONIC. Freemindtronic, Andorran start-up designs and manufactures tailor-made solutions for its customers in the field of safety and cyber security of information systems and computer systems.

    Fabrice is Associate Professor at Paul Sabatier University in Toulouse where he teaches cybercrime phenomena. He is at the origin of the creation of 3 forensic laboratories as head of forensic activities within the french police in Toulouse and within the SCASSI company. He has worked for 27 years in the judicial police, including 17 years following national and international cybercrime investigations. As a judicial expert since 2004 at the Court of Appeal of Toulouse, he has witnessed the delinquent transformation of cyberspace between 2000 and 2017. As a computer engineer, he has understood that the origin of cyberthreats is not always due to a defect in computer tools but more often to a misuse of these tools.

    Fabrice can be reached online on LinkedIn: https://www.linkedin.com/in/fabricecrasnier/

    For more information, visit the company website at www.freemindtronic.com


    Freemindtronic Win Awards 2021 Next-Gen in Crypto Security with EviCypher & EviToken Technologies


    Freemindtronic win awards 2021 Most Innovative in Hardware Password Manager with EviCypher & EviToken Technologies


    Freemindtronic win awards 2021 Next-Gen in Secrets Management with EviCypher & EviToken Technologies


    NEWS PROVIDED BY

    Cyber Defense RSA Edition for 2021 
    May 18, 2021
    Related Link:
    https://www.cyberdefensemagazine.com
    Source Link:
    https://www.cyberdefensemagazine.com/annual-editions/RSA-2021/Cyber-Defense-Magazine-RSA-Edition-for-2021.pdf


    SHARE THIS ARTICLE