Pages:
Author

Topic: 📌 [ANN] 📈 [Pre-ICO] CloudFish - Disrupting Global Cloud Security 🌎 - page 25. (Read 4800 times)

newbie
Activity: 8
Merit: 0
The importance of security these days cannot be stressed enough. Security is the forefront of cloud. I think this project is the platform which can provide us security at its best.
newbie
Activity: 50
Merit: 0
Project looks interesting! (Y)
I have a question. What makes this coin superior to Storj ?

Thanks for your compliments.

Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space.

CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI).

Cloud Access Security Broker (CASB)

The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions.  The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked.

https://cloud-fish.com/cloudfish-corp-website/ico/Conceptual-Diagram-2.png

Cloud Data Encryption Interface

The Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.

In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud.

CLOUDFISH CLOUD SERVICES GATEWAY (CSG)

CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server.

The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers.

The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and  machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each.
 
Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network .

Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise.

https://cloud-fish.com/cloudfish-corp-website/ico/CSG-Nodes-Concept.jpg




Well explained !
newbie
Activity: 20
Merit: 0
There’s just three days to go until the Future Block Chain Summit in Dubai. Come, join us! & be the CEO of your health.
newbie
Activity: 1
Merit: 0
We’re only beginning to see the potential of blockchain technology. Innovations in blockchain have made it increasingly attractive – and usable – to organizations outside the cryptocurrency world.

Financial institutions, political organizations, cloud storage providers, and even online casinos have all started using blockchain technology. We don’t know where blockchain technology is going next, but we can’t wait to see.
newbie
Activity: 26
Merit: 0
This project is the future. I see great prospects, team skills and a great idea! Very conveniently implemented approach to each participant. Thank You!
newbie
Activity: 61
Merit: 0
ICO is a fundraising mechanism in which new projects sell their underlying crypto tokens in exchange for Bitcoin and Ethereum. It’s one of the easiest and most efficient methods for companies and individuals to fund their projects and for regular users to invest in projects they see value in.
newbie
Activity: 44
Merit: 0
The inaugural Future Blockchain Summit will address the conundrums, dispel the myths, deliver practical applications and reveal the technology’s potential for business and government leaders, industry practitioners and startups.
With a wide variety of learning formats and networking opportunities for international and regional delegates from key industries, it is the blockchain event for individuals seeking true, shared digital permanence!
newbie
Activity: 40
Merit: 0
With the growth in the cryptocurrency market and blockchain technology comes the opportunity for startups to crowdfund through cryptocurrency. In an ICO, a company uses blockchain technology to issue cryptocurrency and offer it for sale to investors in exchange for legal tender or other cryptocurrencies.
newbie
Activity: 23
Merit: 0
One of the major attractions of ICO is that the digital token issued by the developer is tradeable. It is a utility token that can be traded on ERC20 compliant
exchanges or used for buying products and services from CloudFish.This provides liquidity.
sr. member
Activity: 756
Merit: 250
CloudFish is going to be presented at the Future Blockchain Summit in Dubai which is one of the most important blockchain conference of the year. This is the great news! I can see the bright future of Cloudfish!

Is it really that important? It is a good place to go but here are massive conferences out there. Much bigger when you consider how big Dubai was.
newbie
Activity: 8
Merit: 0
What is the future of Cloudfish? What will be the next step of the team to make this project better and successful?
sr. member
Activity: 616
Merit: 251
Artificial intelligence is now a mainstay in helping businesses better secure themselves. cloudfish uses artificial intelligence and machine learning techniques to automate threat detection and control before it becomes a risk to the security of users’ assets.

Is this similar to Polyswarm or is the business model or actual use case completely different? It sounds a bit similar from what I read.
newbie
Activity: 61
Merit: 0
CloudFish is excited to announce that CloudFish is invited in Future Blockchain Summit to be held on 2nd and 3rd May, 2018.

Future Blockchain summit is organized Dubai’s Government body ie. is the Dubai World Trade Centre and the participant of the summit is Smart Dubai which is another Government body of Dubai, which indicates the high level of involvement by the Dubai Government, making it unique from any other Blockchain summit. CloudFish developed a multi-layer cloud platform that enables businesses to secure their digital assets stored in the cloud by leveraging the blockchain technology.

CloudFish is going to be present at the Future Blockchain Summit in Dubai, Meet with “Faisal Faruqi, the CEO and Co-founder of CloudFish” and the team, With the help of CloudFish you can easily encrypt your digital assets like documents, emails, IPAs, crypto-currencies etc.
newbie
Activity: 15
Merit: 0
CloudFish actually provides an encryption layer on the data that is going to the cloud and implements a security mechanism that stores users security keys on blockchain after splitting it onto fragments.

CloudFish’s Cloud Access Security Broker (CASB) uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions. The use of blockchain for security keys validation makes it not only impossible for a hacker to steal but also makes it easy for the actual user of the data to access it anytime from any platform.
newbie
Activity: 23
Merit: 0
Artificial intelligence is now a mainstay in helping businesses better secure themselves. cloudfish uses artificial intelligence and machine learning techniques to automate threat detection and control before it becomes a risk to the security of users’ assets.
newbie
Activity: 20
Merit: 0
It is good to see you in Dubai Future blockchain summit.
newbie
Activity: 26
Merit: 0
The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform…… means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked.
newbie
Activity: 40
Merit: 0
Assessing an ICO isn’t easy.But with some care, some thought and plenty of caution, it is possible to dive into an ICO and make some smart decisions. cloudfish is definitely considered investing in CloudFish ICO. Unlike many other ICOs on the market, CloudFish already has fully-developed and successful product.
newbie
Activity: 23
Merit: 0
When it comes to the importance of Cloud security, there are no two ways about it. With so many recent breaches and technological attacks, maintaining security has become all the more important. For this very reason, companies are become more and more particular about risk and the unknown disadvantages they fear of the unknown.
Since the Cloud structure is still relatively a mystery, there is a lot to be investigated, especially from a security perspective. But this does not negate the fact that organizations are increasingly looking for Cloud service providers which are stable, secure and offer more than one layer of security for their client’s data.

newbie
Activity: 44
Merit: 0
The cryptocurrency market, which trades various digital-based coins, can look exciting, scary, and mysterious all at once to the casual observer.  ICOs (initial coin offerings for new cryptocurrencies), meanwhile, are emerging at a head-spinning rate.

Pages:
Jump to: