Beruflich Dokumente
Kultur Dokumente
BusinessReliance on TrustworthyInformation
An organizations data is arguably its greatest asset. Data can be created, transferred, and reside nearly
anywhere imaginable; stored inside the organization, distributed throughout the organization, shared
outside the perimeter of the organizations network for partners and customers to utilize, and even hosted
in the cloud for immediate global access. How can each user of the data (employee, partner, attorney, etc.)
be guaranteed that the data is authentic and intact? One thing is for sure, using questionable data to run
a business is unacceptable. Trust, simply put, is not enough.
The Risks o
f Tampered Data Storage and Data Communications
Organizations collect, share, send, store, and archive all types and forms of data for many purposes and
for varying lengths of time. Regulatory policies and industry standards define specific data retention
requirements for event logs, transaction logs, and other policy-oriented data. eDiscovery requirements, for
example, may call upon your data to be used as legal evidence at any time: 5, 10, or even 20+ years after
being archived. What damage could occur from using invalid data? Simply hoping that the data hasnt
been tampered with is not a risk organizations can afford to take.
In addition to the risks of compromised data at rest, organizations must also be concerned with man-inthe-middle attacks as data is transmitted throughout multiple networks, including internal, external, and
cloud-based networks. How can both ends of the transmission (both sender and recipient) prove that the
content sent did indeed come from the entity that claims to have sent it? How can the recipient prove that
the content has not been tampered with after it left the sender or was forwarded by another recipient?
It does not matter how or when the data was sent or stored - or even how it is received or retrieved on the
other end - when the data has been signed by GuardTimes Keyless Signatures, the signature remains with
the data, thereby eliminating the need to rely on any public/private key technologies or any other form of
secret to validate the signature.
GuardTime Keyless Signature Solutions are purposebuilt offerings designed to deliver a mathematicallyprovable audit trail for all the electronic data in any
business.
Complete D
ata Integrityfor EveryScenario | Keyless Signature Products
GuardTimes products help its customers, technology partners, and industry-leading solutions and service
providers to deliver undeniable proof of integrity for all of their business data: in the cloud, on disk, and
in transit. GuardTimes products are networked server components that operate as part of the Keyless
Signature system, connecting to the Keyless Signature service over the Internet via one or more access
points. Each product can be internally deployed or hosted by GuardTime, and accessed via the Keyless
Signature SDK.
Data Audit Server | Bring a Provable Audit Trail to any Business Process
Organizations can conduct business electronically with a mathematically-provable audit trail for their
electronic data, making fraud harder to conduct and insider attacks nearly impossible to hide while
strengthening the legal admissibility of their digital records.
The primary role of the Data Audit Server is to sign large volumes of transactional (non-document) data.
Using the Data Audit Server, organizations will benefit from tamper-evident transparency, indisputable
audit trails, durable verification, and unlimited signing capabilities.
Document Signature Server | Bring a Provable Audit Trail to any Document Workflow
Organizations can move a larger number of their paper-based processes to a more auditable, electronic
model by digitally signing individual documents and then packaging multiple documents into a single
signed PDF container. The resulting keyless signature enables organizations to share, transmit, store, and
archive their electronic document containers, providing mathematical proof that the documents were
signed by a particular individual or organization at a specific moment in time and that the contents of the
container have not changed since then.
The primary role of the Document Signature Server is to sign data in the form of traditional office documents
using the GuardTime Keyless Signature service. As an option, the Document Signature Server is able to
take one or more data items and bundle them into a single PDF container so that it can be signed as
a single unit. Using the Document Signature Server, organizations will benefit from portable auditable
documents with the option to have multi-document signed containers, tamper-evident transparency, and
durable verification.
Enterprise Messaging Server | Certify any Email and all of its Contents
Organizations can deliver assurance to their email recipients that the emails they receive are authentic
and remain intact by signing each electronic mail as a single, portable unit. The signature benefits both
sides of the communication as it provides proof that the email was sent at a specific moment in time by the
sending entity, and that the contents of the email have not changed since then. The proof remains intact
for the life of the email and is portable, following the email as it is sent, replied to, forwarded, and archived.
The primary role of the Enterprise Messaging Server is to take a snapshot of the entire email message being
signed, add to this a snapshot of all the attachments included in the email, package them up into a single
PDF container, and then sign that PDF package using the GuardTime Keyless Signature service. Using the
Enterprise Messaging Server, organizations will benefit from reduced SPAM and phishing, tamper-evident
messaging, life-long non-repudiation, and reduced printing and courier costs.
Independent Verification
Long-Term Verification
Massive Scalability
High Availability
Provable Security
Flexible Pricing
A Red Herring Global 100 and Frost & Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving
one of the biggest problems in computing: trust. GuardTimes Keyless Signatures provide proof of time, origin and integrity
for the worlds electronic data. The verification of the signature can be done offline without the reliance on keys, secrets, or the
existence of a trusted third party. GuardTimes mission is to change the world to one where
keyless signatures are ubiquitous and a natural part of the everyday data lifecycle, whether
on disk, in transit, or in the cloud. For more information, please visit www.GuardTime.com.