Database Plugins’ answer to system security is so effective in thwarting cyber thievery and malware, we're calling it "unhackable" and challenging the hacker universe to prove us wrong.
We’re confident in the robustness of our solution because Database Plugins has reinvented the method in which to manage, and secure valuable digital assets. It is a new system architecture that leverages and improves database technology in order to eliminate file system vectors for hackers and malware.
While there is a lot to talk about it terms of Database Plugins functionality (Its range of uses includes multimedia, network computing, big data analysis and device control), the greatest advantage of the system is its inherent security even before any kind of encryption is added.
With Database Plugins, there are three main things that affect the security of the data as well as the system itself.
There is no file system. That mean that malware, which is designed to navigate a system using a “file tree”, will simply not work in a Database Plugins environment.
All data and logic are stored together within a database. This solution eliminates the need to expose data outside of the users database when it’s being worked on by an application. Only results (not actual files) need to be sent to the end-user layer for display.
Randomly generated “file names.” Programs access the data they need using a randomly generated 105 character filename that changes EVERY TIME the data is accessed (the equivalent of opening a file). These files names are keys for programs to find the data in the database, If a hacker discovers one of the names, it will be worthless - the names expire after every use.
The Challenge: We think it will be impossible for a hacker to access data stored in our system without using an authorized program on the system itself. To prove this, we’re going to store a short film called “Spinnaker” on a database using our system. The movie will be edited and stored in Quicktime format on the database using an open source video editor, Kden Live. Can you find and extract “Spinnaker” without authorized-user credentials? We don’t think so. This simulates an insider attack from a user who has access to a system but is not authorized for sensitive files.
Any comments or suggestion on how we can make this test better in any way are welcome. After your input on our test, we plan to put a CASH BOUNTY on “Spinnaker” with the comfort that we’ll still have the money left when we get to Oracle Open World this Fall.
Email me with your feedback: email@example.com