Pages:
Author

Topic: 📌 [ANN] 📈 [Pre-ICO] CloudFish - Disrupting Global Cloud Security 🌎 - page 8. (Read 4800 times)

newbie
Activity: 26
Merit: 0
In CloudFish the Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.
newbie
Activity: 7
Merit: 0
I predict because of the blockchain technology CloudFish-a key innovator in cloud security software built on blockchain will play a vital role for cloud security and the  team looks pretty good which is a mixture of blockchain technology expert and software giant having three decade experience.
newbie
Activity: 7
Merit: 0
Security technologies are evolving, and enterprises have more access to cloud security tools that provide the control and visibility they crave. New environments, such as hybrid and multi-cloud, can create additional gaps and vulnerabilities, but tools, such as cloud access security brokers, now target those unique attack surfaces. By forming a comprehensive strategy, enterprises can take a proactive approach against cloud security challenges and risks.
newbie
Activity: 23
Merit: 0
If you want to enjoy better privacy, always look for cloud storage services that offer local encryption for your data. CloudFish developed a multi-tier encryption based security model that leverages block chain to secure encryption keys.
brand new
Activity: 0
Merit: 0
It Is A One-Of-A-Kind Approach When It Comes To Cloud Security

Cloud fish is using blockchain technology to secure data. Cloudfish generated a technology that allows the encryption of assets like emails, documents, and cryptocurrencies. Cloudfish then breaks the keys for encryption into millions of smaller pieces and then separates then into a blockchain making it very hard to hack and steal the crucial data.
newbie
Activity: 20
Merit: 0
The importance of security these days cannot be stressed enough. Security is the forefront of cloud. I think this project is the platform which can provide us security at its best.
newbie
Activity: 14
Merit: 0
Cloudfish gives us  the security that we always wanted, because Cloudfish Detects, deflects, and counteracts attempts at unauthorized use of information systems and gives your security team an unfair advantage over hackers.this project is going to be one of the successful project in the cryptoworld.
newbie
Activity: 40
Merit: 0
Having in mind that the threats are always on and hackers lurk everywhere in the cyber space, i beleive that projects like this add value to the blockchain technology implementation.
brand new
Activity: 0
Merit: 0
A project such as this is bound to be successful. I'd like to thank the brains behind it for giving out opportunity to partake in this.
newbie
Activity: 20
Merit: 0
ICO stands for "initial coin offering," and refers to the creation and sale of digital tokens.

In an ICO, a project creates a certain amount of a digital token and sells it to the public, usually in exchange for other cryptocurrencies such as bitcoin or ether.

The public could be interested in the tokens on offer for either or both of the following reasons:

1) The token has an inherent benefit – it grants the holder access to a service, a say in an outcome or a share in the project's earnings.

2) The benefit will be in increasing demand, which will push up the market price of the token.

Tokens, especially those of successful sales, are usually listed on exchanges, where initial buyers can sell their holdings and new buyers can come in at any time.

As a type of digital crowdfunding, token sales enable startups not only to raise funds without giving up equity, but also to bootstrap the project's adoption by incentivizing its use by token holders.

Buyers can benefit from both the access to the service that the token confers, and from its success through appreciation of the token's price. These gains can be realized at any time (usually) by selling the tokens on an exchange. Or, buyers can show their increasing enthusiasm for the idea by purchasing more tokens in the market.

Definitely jumping all over this. security is a huge issue in the world and everyone can benefit from this project.
newbie
Activity: 44
Merit: 0
I wish you success!
Absorbing idea, spotless approach, informed idea!

Exactly my interest in the project, i believe the buzz are coming in for the project soonest especially with the fact that the team are readily available to take on question thrown at them
newbie
Activity: 61
Merit: 0
ICO stands for "initial coin offering," and refers to the creation and sale of digital tokens.

In an ICO, a project creates a certain amount of a digital token and sells it to the public, usually in exchange for other cryptocurrencies such as bitcoin or ether.

The public could be interested in the tokens on offer for either or both of the following reasons:

1) The token has an inherent benefit – it grants the holder access to a service, a say in an outcome or a share in the project's earnings.

2) The benefit will be in increasing demand, which will push up the market price of the token.

Tokens, especially those of successful sales, are usually listed on exchanges, where initial buyers can sell their holdings and new buyers can come in at any time.

As a type of digital crowdfunding, token sales enable startups not only to raise funds without giving up equity, but also to bootstrap the project's adoption by incentivizing its use by token holders.

Buyers can benefit from both the access to the service that the token confers, and from its success through appreciation of the token's price. These gains can be realized at any time (usually) by selling the tokens on an exchange. Or, buyers can show their increasing enthusiasm for the idea by purchasing more tokens in the market.
newbie
Activity: 26
Merit: 0
Security on cloud is paramount. No matter if you have the cloud security strategies in place, continuously monitoring and auditing your cloud infrastructure to spot and heal the vulnerabilities way ahead of time is a challenge that most businesses are facing today. CloudFish is the best choice.
newbie
Activity: 19
Merit: 0
The future belongs to cloud computing, but only with the help of strong security. I am sure this project will provide the best security to its users!
newbie
Activity: 50
Merit: 0
The CloudFish Cloud Service Gateway provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers.
newbie
Activity: 14
Merit: 0
Honestly I am just so happy about the progress of this project. I can't wait to enjoy all the benefits that come with it also.
newbie
Activity: 40
Merit: 0
When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components.Companies still fear that their data is insecure with cloud systems.
Businesses are moving their data from on-premise servers to cloud. And second, as the block- chain assets’ market like crypto-currencies is getting traction, the business decision makers are planning to diversify their assets and invest in the crypto-currencies. The commercial security products and crypto-currency wallets available in the market today, rely on encryption-based security using a single private key that is stored either on a local computer or an external cloud server. If the key is lost, stolen or hacked, the digital asset is lost. This creates the need for an enterprise class solution that provides a more robust and unified security solution not only for the digital assets like documents, files, emails etc. but also for the crypto-currency assets stored in the cloud. Security breaches in external cloud servers, internal and external intrusions and hacking by individuals and foreign governments poses a critical threat to the enterprise data stored on commercial cloud servers. The security of the cloud server is managed by the cloud service providers and the companies have little control over the security of their data and no significant legal remedies if their data or crypto currency assets are compromised on the cloud server.

You're right, the digital world is a blessing but it comes with massive risks, so anything that will curb the negative issues we face everyday on the web, should be commendable, sometimes it gives one the creep anytime you think about logging into your accounts or wallets, is not just a safe place, we need protection
brand new
Activity: 0
Merit: 0
To manage the risks associated with today’s environment CloudFish has developed a network using advance machine learning algorithms that provides first hand security and reduce threats.
newbie
Activity: 7
Merit: 0
This is fulfilled par excellence by the CLOUDFISH architecture and the smart contract. Personal data is being stored encrypted and only the consumer who is the owner of the data has the key for its decryption.
newbie
Activity: 44
Merit: 0
Project looks interesting! (Y)
I have a question. What makes this coin superior to Storj ?

Thanks for your compliments.

Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space.

CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI).

Cloud Access Security Broker (CASB)

The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions.  The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked.


Cloud Data Encryption Interface

The Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.

In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud.

CLOUDFISH CLOUD SERVICES GATEWAY (CSG)

CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server.

The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers.

The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and  machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each.
 
Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network .

Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise.







I just read your explain about project. This great to protect our data from hacker with router.

it's an interesting project and security is going to be very high in demand in the coming years with IOT and new technologies, there will be holes and vulnerabilities in applications and networks as technology advances. I'm glad to see a project which is trying to take care of this.
Pages:
Jump to: