Pages:
Author

Topic: 📌 [ANN] 📈 [Pre-ICO] CloudFish - Disrupting Global Cloud Security 🌎 - page 35. (Read 4800 times)

newbie
Activity: 40
Merit: 0
I reviewed your white paper. Seems like a very innovative approach to store security keys in block chain.  What happens if the user forgets their password. How will you reconstruct the encryption keys from block chain ?

We plan to implement a multi-factor authentication to reconstruct keys, if the user forgets the password.
newbie
Activity: 40
Merit: 0
Cloud security is certainly a very hot area. How does your product distinguish from the competitors you mentioned in your white paper ?

That's true. Cloud security is one of the fastest growing areas in the enterprise software industry. We have published in our white paper, some abstract of quotes from some renowned industry research firms like Gartner and IDC.

We have also listed some of our key competitors in the cloud security area. Our competitors are doing fantastic financially because the cloud security area itself is too hot. However, the blockchain-based cloud security technology that CloudFish developed clearly distinguishes us from our competitors.

With the new and innovative technology that CloudFish uses which is validated by industry and academy experts, puts our product in a unique quadrant.

Our investors should also appreciate the thorough market research we have done, the rigorous competitive analysis and the clear comparison of our technology with the rest of the players in cloud security that we have published in our white paper.

newbie
Activity: 40
Merit: 0
Good news for businessmen. They needed it the most.

True. Not only for businesses but we also plan to release a consumer version of our product in the first quarter of 2019. The consumer version will have limited features compared to the enterprise version, but it will offer a secured and less-expensive solution to the individual users who want to secure their digital assets in the cloud.
newbie
Activity: 40
Merit: 0
Nightmare for the hackers. It is quite impossible to steal information where there is Cloudfish.

That's true. Our unique technology to dynamically split and re-construct encryption keys using blockchain, provides a solid security mechanism for enterprises to secure the digital assets.

The core technology we developed, our team with years of experience in large Fortune 500 technology firms and our affiliation with Georgia Tech's ATDC program put us in a very strong position to build a solid cloud security product that addresses the industry needs.
jr. member
Activity: 106
Merit: 2
Good news for businessmen. They needed it the most.
newbie
Activity: 40
Merit: 0
Sounds like a great technology. Using artificial based network intrusion detection and security. Can you please explain what kind of encryption protocol you are using in your product ?

We already answered this question in the thread but will be happy to reply to your specific question.

CloudFish developed an innovative approach to provide cloud security using the block chain technology. Unlike the cloud security solutions currently available in the market, CloudFish invented a blockchain based approach that splits the encryption key into fragments and store it on blockchain. This makes it virtually impossible for a hacker to steal the encryption key and unlock an encrypted document. The algorithm that dynamically splits and re-constructs the encryption key from blockchain is CloudFish's own intellectual property. However, for the actual encryption of the digital assets, we use the industry standard AES 256-bit encryption libraries.

newbie
Activity: 40
Merit: 0
Hello mgr,
Is this project alive or dead. I registered for  both twitter and Face book campaign till now my name is not yet reflected on the spread sheet. Pls reply so that let me know whether to continue or stop the promotion.

We update the worksheet over the weekend. Please email any question you have, to [email protected] if you have any questions and we will be happy to address your questions.
newbie
Activity: 40
Merit: 0
Also are you using some kind of industry standard encryption libraries or your own proprietary encryption algorithms ?

CloudFish developed an innovative approach to provide cloud security using the block chain technology. Unlike the cloud security solutions currently available in the market, CloudFish invented a blockchain based approach that splits the encryption key into fragments and store it on blockchain. This makes it virtually impossible for a hacker to steal the encryption key and unlock an encrypted document. The algorithm that dynamically splits and re-constructs the encryption key from blockchain is CloudFish's own intellectual property. However, for the actual encryption of the digital assets, we use the industry standard AES 256-bit encryption libraries.

In order to maintain a complete visibility into our technology and maintain our technological edge in the cloud security space, we plan to get our solution audited by a third party security consulting firm and publish the audit results on our web site for our customers and partners to review. This auditing will align with the release schedule of our product.
full member
Activity: 476
Merit: 100
Hello mgr,
Is this project alive or dead. I registered for  both twitter and Face book campaign till now my name is not yet reflected on the spread sheet. Pls reply so that let me know whether to continue or stop the promotion.
newbie
Activity: 40
Merit: 0
hello sir, sorry i want to give a little criticism of suggestion from this trull inil, i really do not understand the purpose of the real project and i do not know mission and vision.
how this project works without its roadmap, and clear information.
I have little advice on this project, just ask for a full update of its information and create an interesting scheme so that everyone can understand the purpose and vision-mission of this project, with so many interested investors and want to join this project, because the success of the project comes from many his support of investors and the way the team work

Thanks for your comment.

The project charter, the product we are developing, the roadmap, the release schedule and the team are all mentioned on our ICO web site www.cloud-fish.io
 
CloudFish is an Atlanta based startup affiliated with US's top-tier engineering university, the Georgia Institute of Technology's ATDC Accelerate program.

Please take a look at our white paper for our company and the product and if yo have any questions we will be very happy to answer that.

Once again we thank you for your interest in CloudFish and we hope this answers your question.
newbie
Activity: 40
Merit: 0
How about a TL;DR explanation of the project?

Thanks for your comment and for your interest in CloudFish.

At CloudFish, we are building a data security platform that secures digital assets stored in the cloud, by using block-chain technology. The product provides a distributed security mechanism that enables companies and individual users to secure their documents, emails, pictures, crypto-currencies and wallet keys by leveraging the block-chain technology.

You can take a look at our white paper at www.cloud-fish.io

If you have further questions, we will be happy to answer that.
newbie
Activity: 26
Merit: 0
I noticed an ICO review saying CLOUDFISH has the biggest competitors in the industry, how do you stand out?
newbie
Activity: 32
Merit: 0
It is okay. But let me know what your disaster recovery plan is?
member
Activity: 102
Merit: 10
Cloud security is certainly a very hot area. How does your product distinguish from the competitors you mentioned in your white paper ?
jr. member
Activity: 88
Merit: 1
Nightmare for the hackers. It is quite impossible to steal information where there is Cloudfish.
member
Activity: 105
Merit: 11
hello sir, sorry i want to give a little criticism of suggestion from this trull inil, i really do not understand the purpose of the real project and i do not know mission and vision.
how this project works without its roadmap, and clear information.
I have little advice on this project, just ask for a full update of its information and create an interesting scheme so that everyone can understand the purpose and vision-mission of this project, with so many interested investors and want to join this project, because the success of the project comes from many his support of investors and the way the team work
I Am Agree With You.
member
Activity: 105
Merit: 11
New name in the digital security world. Kindly name the compliance certifications you have earned.
member
Activity: 336
Merit: 10
hello sir, sorry i want to give a little criticism of suggestion from this trull inil, i really do not understand the purpose of the real project and i do not know mission and vision.
how this project works without its roadmap, and clear information.
I have little advice on this project, just ask for a full update of its information and create an interesting scheme so that everyone can understand the purpose and vision-mission of this project, with so many interested investors and want to join this project, because the success of the project comes from many his support of investors and the way the team work
newbie
Activity: 42
Merit: 0
I reviewed your white paper. Seems like a very innovative approach to store security keys in block chain.  What happens if the user forgets their password. How will you reconstruct the encryption keys from block chain ?
newbie
Activity: 62
Merit: 0
Also are you using some kind of industry standard encryption libraries or your own proprietary encryption algorithms ?
Pages:
Jump to: