Pages:
Author

Topic: 📌 [ANN] 📈 [Pre-ICO] CloudFish - Disrupting Global Cloud Security 🌎 - page 18. (Read 4800 times)

newbie
Activity: 40
Merit: 0
Project looks interesting! (Y)
I have a question. What makes this coin superior to Storj ?

Thanks for your compliments.

Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space.

CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI).

Cloud Access Security Broker (CASB)

The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions.  The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked.


Cloud Data Encryption Interface

The Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.

In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud.

CLOUDFISH CLOUD SERVICES GATEWAY (CSG)

CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server.

The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers.

The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and  machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each.
 
Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network .

Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise.





Internet security has always been a matter of concern for everybody. Cloud service providers also work to safeguard their clouds they have been managing for their clients from thefts like spamming and hacking. Threats and solutions to global cloud security are well explained by Cloudfish
newbie
Activity: 44
Merit: 0
Cloud offers automated backups to your data. Since your data is stored away from your location, your business continues to operate even if there is any outage or disaster at the business premises. You can recover your data even if you lose your device or accidentally delete data.
newbie
Activity: 100
Merit: 0
CloudFish product is based on a platform-agnostic technology. It’s accessible from Web,Desktop or Mobile. It is Platform Independent.
newbie
Activity: 61
Merit: 0
Cloud computing refers to an promising model of computing technology where machines with large data centers can be dynamically provisioned, configured, controlled and reconfigured to deliver services in a scale able manner. It is an innovative architecture; where visualization as what may be the future of computing .
As being refers to cloud computing, it delivers computing as a service rather than as a product; in which share resources, application software and information to provide computers or other electronic devices as a utility over the Internet in real time.
Servers provide services to clients according to their request or pay base. Cloud computing provides a shared pool of configurable resources on demand, in which needs minimal effort of management to get better services.
CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology. it use machine learning algorithms to automate threat detection and control before it becomes a risk to the security of users’ assets.
newbie
Activity: 23
Merit: 0
which allows you to backup to eg. Dropbox or OneDrive. Data is encrypted with your own key before transmission and you are not tied to a service provider that suddenly decides to shutdown their consumer service.
newbie
Activity: 7
Merit: 0
Block chain technology must have a structure before providing security for it's underlining protocols. By providing segmentation for the block chain you will find it more flexible, we will be able to control and set it's dependencies.
newbie
Activity: 7
Merit: 0
I beleive that projects, which are really solving a problem and are unique, will make do good in their future.
I keep studying blockchain projects, and feel that the CloudFish project can do really good, irrespective of their ICO's success.
newbie
Activity: 20
Merit: 0
I came across this great project while searching for good ICOs which rightfully utilizes Blockchain technology to  to secure digital assets stored in the cloud.
newbie
Activity: 26
Merit: 0
I am very curious about the next progress, and I am waiting to hear. Huh
newbie
Activity: 19
Merit: 0
The future belongs to cloud computing, but only with the help of strong security. Whether you’ve migrated some or your entire infrastructure to the cloud, or are still considering the move, you should be thinking about security of the cloud, so we should choose the better platform which can give us 100% security!
newbie
Activity: 50
Merit: 0
Figuring out a good path to security in your cloud configurations can be quite a challenge. Choose cloudfish and secure your data and information.
newbie
Activity: 28
Merit: 0
The idea is not new, because there were several projects with same idea before. But where are they now? Ilon Mask will give us internet for free, so why do we need to invest here?
newbie
Activity: 61
Merit: 0
Artificial intelligence is now a mainstay in helping businesses better secure themselves. cloudfish uses artificialintelligence and machine learning techniques to automate threat detection and control before it becomes a risk to the security of users’ assets.
newbie
Activity: 15
Merit: 0
Cloud computing provides highly scalable computing environment for an assortment of IT services. It provides services to client individual, to big organizations or companies. As a result, IT departments and individuals are saved application developments, deployments, securities, purchasing new hardware and software and maintenance time and cost effectively. Cloud service helps to reduce power consumption, cooling, storage and uses space for cloud users or consumers in cloud environment. There are two key factors for an organization to concern:
Going green
saving charge
CloudFish developed a security platform that enables companies and individual users to secure their assets stored in the cloud using blockchain technology. it use machine learning algorithms to automate threat detection and control before it becomes a risk to the security of users’ assets.

newbie
Activity: 23
Merit: 0
ICO has proven to be a valuable real-time asset in the information age. As the days go by ICO is attracting more and more sectors both for businesses as well as commercial purposes. Initially finally played a vital role in cryptocurrency market. Now providing the huge efficiency the application of ICO are intensified.
I honestly believe that 2018 will be an even better year for ICOs than before. This is down to the fact that I expect crypto to continue to grow in value and also in general adoption.
newbie
Activity: 40
Merit: 0
I think many people fear the cloud because they believe it is less secure than internal IT. I actually think that the cloud is more secure Smiley The truth is that security patching is more streamlined in the cloud where there are dedicated staff ensuring security standards. To be reassured of the level of security and reliability your data is getting in the cloud, examine closely the cloud service provider’s security policy.
newbie
Activity: 26
Merit: 0
blockchain and AI are two technological trends which, while ground-breaking in their own rights, have the potential to become even more revolutionary when put together. CloudFish provides a unified security platform for digital and blockchain assets built on artificial intelligence.
newbie
Activity: 44
Merit: 0
Cloud security services have become crucial as these provide access to the most advanced security solutions, provide solutions to critical problems faced by companies in the current work scenario, and support remote workforce. As the number of mobile workers accessing the company’s private network is growing substantially, identity and access management has become of prime importance.
newbie
Activity: 32
Merit: 0
A blockchain network can either be public or private based on who is authorised to participate. The essential difference between a public and private
blockchain is that one operates in a decentralised open environment where there are no restrictions on the number of people joining the network, while
the other operates within the confines defined by a controlling entity. A simple analogy is the difference between the Internet and the intranet. While the
inherent technology for networked computers remains the same, there is a big difference between the dynamics and utility associated with a closed
network (such as a home network) and an open network (such as the Internet).

In reality, this difference plays out based on how ‘nodes’ are incentivised to remain a part of the network. The key idea here is that in a public blockchain, the consensus mechanism is based around rewarding each individual participant to remain a part of the network. In a private blockchain, the need for creating this incentive does not exist.
newbie
Activity: 61
Merit: 0
Cloud computing refers to an promising model of computing technology where machines with large data centers can be dynamically provisioned, configured, controlled and reconfigured to deliver services in a scalable manner. It is an innovative IS (Information System) architecture; where visualization as what may be the future of computing. As being refers to cloud computing, it delivers computing as a service rather than as a product; in which share resources, application software and information to provide computers or other electronic devices as a utility over the Internet in real
time.
Pages:
Jump to: