Another bombshell!

In late February 2018, a large-scale cyber-attack on the German parliament exposed just how vulnerable even seemingly well-safeguarded systems really are.

Unfortunately, this is but one of many threats!

Harness the technology of the future today

Raise safety awareness

Protect your investment

Open up new business opportunities

In 2014, several expert minds from the fields of cryptography and international software consulting gathered to address the question why the entire software industry is using “medieval” methods to safeguard data and files against outside access. Quite like in the middle ages, they practice still is to build the highest possible “safety walls” around data, yet in order to transfer or edit the data, its protection must be stripped, or an access key must be shared. Yet instead of solving this fundamental issue, the industry is trying to raise ever taller walls – unsuccessfully.

All involved parties agreed that it must be possible to find a truly safe – and therefore, completely novel – way to secure our data.

In 4 years of painstaking programming, development and testing, the team successfully formulated, created, and patented a whole new technology (NVD). It is no longer based on ‘locking’ data into secure systems, but rather integrating the protection into the data itself. This allows for entirely new dimensions in data protection, in the way we handle, distribute, control and store our data.

This technology is considered a secure solution for our networked future.

No matter which industry or IT-related field, whether it is the Cloud, IoT (Internet of Things), smart devices or autonomous driving – data has never been so valuable and yet as vulnerable as today.

It‘s time to change the game!

NVD Technologie

 

You cannot touch NVD technology, you cannot put it into simple words and you cannot see it, but: NVD is an essential factor to solve the problems we described to the left!

We will take the time to explain this technology of the future to you.
Don’t miss out on the eye-opening experience of discovering the game changer in data security technology!

We have solved the cyber problems of the world!


Cyberattacks!

Digitization is the future without any doubt.
However, the increasing complexity (networking, billions of devices) has pushed current protection technologies to their limits, and as a result the number of cyberattacks have increased dramatically!

NVD leads to the necessary
quantum leap in data security
to prevent those!

NVD is more than data security!

NVD lifts products and applications to a new quality level, generates confidence and fulfils legal requirements – with reduced complexity and OPEX.

While debating the future …

The digital world is living in the middle ages!

Current technologies build protections AROUND data!

Problems

1


Loss of control

As soon as you share data, you lose control over what happens to it next. There is no way to actively withdraw data privileges afterwards.

2


Insufficient protection

Building protection around data using encryption or encapsulation is the wrong strategy, because data needs to be unencrypted to be processed – which means protection must be removed beforehand.

3


Non-compliant

Not only your data, but in particular, additional information (meta data) is critical, since analytical systems can process this info, potentially identifying personal info associated with this data.

4


Complexity

An increasing number of devices and the need to securely connect them escalates complexity (key management), weakening security. Current technologies are doomed to lead into an impasse!

You can’t attack data you can’t see.

This is what the future looks like!

NVD integrates protection INTO the data as it is created!

Solutions

1


 

Control

NVD access procedures and genuine end-to-end protection guarantee that you stay in control of your data – permanently.

2


 

Digital immunity

We integrate protection and privacy directly into your data, making them immune to attacks and manipulation. Even insider attacks or compromised systems cannot harm them.

3


 

Compliance

Anonymous data do not contain any personally identifiable information or content. NVD-based applications comply with legal requirements for the protection of personal information.

4


 

Scalability

Efficient protection is applied right as the data is generated, providing uniform protection for anything, whether it is a smart electricity meter or a full-fledged industrial plant.

 

1


 Control

NVD puts you back in control of your data!

You alone decide who will have access to your data and you will never surrender control over it! You will always have the option of withdrawing access information retroactively.

We can’t teleport – yet. But we have managed to make data untraceable and invisible. No type of attack can impact you. Manipulation is impossible, compliance is ensured!

Your advantage with NVD

You retain exclusive control over your own data! You decide about access and viewing privileges!

Disadvantage without NVD

No control over your data whatsoever! Others are in charge!

 

2


Digital Immunity

Integrated protection inside the data, eliminated weak points: This is digital immunity.

Data manipulation and data theft are no longer possible, not even with quantum computers. Your data content is immune to cyberattacks, right away, and more importantly, in the future.

Keys, locks, and gates have been common points of attack for centuries. As our computer systems become more powerful, these obstacles are ever easier to overcome. Integrated protection and privacy inside the data ensure your immunity.

Your advantage with NVD

Perfect defense against data theft and manipulation! You will be lightyears ahead of any cyberattack!

Disadvantage without NVD

Growing complexity leads to more frequent attacks. Quantum computers will leave today’s protections even less secure. A collapse is looming!

 

3


Compliance

We remove all personally identifiable information, which makes us compliant with today’s and tomorrow’s legal requirements.

NVD does not contain any metadata and no personally identifiable information. You don’t have to worry about any legal restrictions in terms of privacy, for what you can’t see can’t be stolen or manipulated.

Metadata and especially personal information provide excellent cues for attackers to find weak spots. NVD does not use any meta data at all and ensures compliance.

Your advantage with NVD

Your insurance for legal compliance, today and in the future!

Disadvantage without NVD

Non-compliance with legal regulations means loss of goodwill and harsh penalties!

 

4


Scalability

We don’t have a weak link. Seamless data protection from the very start.

Plug-and-play, easy-to-use privacy for any device. For us, security and performance are both must-haves to give IoT solutions the security and performance they need to boost innovative business models.

Billions of devices will be communicating and sharing data in the IoT, without sufficient protection. We establish perfect end-to-end protection, without increasing the effort, regardless of application or device.

Your advantage with NVD

Uniformly high protection level, regardless of type or number of networked devices or applications!

Disadvantage without NVD

Traditional protection methods are too complex, expensive, and rigid to be fully integrated!

 


Patent-protected

Not only secure, but perfectly safeguarded. Patented technology that is future- and innovation-proof!

All our methods and algorithms are patented, securing your investment.

 

 

 

Today’s data security technologies are already reaching their limits and in no way meet the requirements of autonomous driving, the IoT or the healthcare sector!

Your advantage with NVD

You can benefit from a patented, revolutionary technology with enormous potential!

Disadvantage without NVD

A competitor could beat you to it and win the market using NVD!

The Decision-Makers’ Top Concerns

according to Gartner’s CIO agenda

4 exemplary fields of application

Internet of Things

Industrial Cloud, SmartGrid, Connected-/Autonomous Cars

Issues

All possible IoT scenarios are facing similar challenges – how do you secure billions of different devices, network and server components? Since every single device is a possible attack point, each one must have a similar level of protection, whether it is an electricity meter or a nuclear plant.

Rising complexity makes it virtually impossible to control and secure all connected devices.

Solutions

We make sure that data on all devices is made immune to attacks or manipulation. We achieve this by applying an extremely efficient procedure right when the data is first created, and this immunity is permanent – which makes it completely irrelevant if data later runs on insecure or even compromised devices. NVD not only solves the challenges we described, but vastly simplifies and reduces the complexity of IoT architectures, since immediate protection eliminates the complex need to secure every single device in the chain.

Example CarSharing

Personal contacts, GPS destinations or other personal settings follow the driver. Future drivers can‘t see this info in the rental vehicle.

Healthcare

Legally compliant, Electronic patient files

Issues

Huge amounts of medically relevant data are captured digitally, from Fitbits to doctors or hospitals entering patient data, to insurance providers storing and analyzing medical information.

It is currently virtually impossible to ensure legally compliant long-term storage of complete data and conduct a targeted analysis of this data at a later point in time.

Solutions

NVD gives patients full control over their data as well as the flexibility to decide if, when, what, and how long they want to release their data (e.g. providing certain information to a doctor for specific treatments). NVD access control prevents data from being used outside of the defined scope or beyond the duration of use – the data simply won’t be retrievable.

Of course, additional protections such as (partial) anonymization can be implemented as well, but they do not affect the original raw data – and thanks to NVD, even this newly generated anonymized data can only be used in a targeted fashion.

Example Electronic patient files

In the event of an accident, medical data can be released to the hospital automatically and case-based for the duration of treatment.

Financial services providers / FinTechs

Data control and new, data-based business models

Issues

Banks are under enormous cost pressure, but for fear of safety breaches, they rely on old and expensive technologies. FinTechs are on the offensive, and they are using the Cloud.

In addition, new regulations such as PSD2 require these old systems to open up so financial institutions can share customer information. This leads to the aforementioned loss of control over a precious banking asset – their data.

Solutions

NVD makes it possible to use the Cloud while enjoying greater data security. In addition, (client) data can now be shared usage-based (e.g. for a credit check) and fully withdrawn at any time.

Legal requirements are met without the dreaded loss of control. This raises whole new cost-saving potentials and opportunities for new business models in the area of data trade – as Amazon, Facebook and Google are already doing with great success.

Example Banking Cloud

Massive, risk-free savings in operating costs (OPEX).

Cloud providers

Creating goodwill for Cloud providers

Issues

Embracing the Cloud is a step that many companies consider a loss of control and a source of insecurity: Is their data really safe from third-party access and, not least, from the providers themselves?

Today’s Cloud providers often circumvent encryption in order to be able to offer cheap B2C and B2B storage solutions. This is what makes space-saving deduplication possible in the first place.

Solutions

NVD protects your data seamlessly, no matter where it is stored. Selective access to partial information allows for anonymized processing without the need to remove any data protections (as is the case with encryption).

Also, NVD-protected data is stored de-duplicated on any server, globally and with high performance, fortifying your level of protection and greatly accelerating access speed.

Example The Public Cloud becomes Private

Vastly more secure and scalable than your Private Cloud, at the price of a Public Cloud.

NVD-Technology!

Invisible data in 3 steps


1


Immediate, automatic protection

As the data is generated, it is analyzed and, based on the results, converted into binary fragments without any visible information (distorted, encrypted, disjointed etc.). Data is thus immune to any attack or manipulation. It can now be transferred or stored at will, no further protection necessary.

2


Dynamic address calculation

Instead of verifying users and passwords based on existing information, as we do today, a number (address) is calculated based on various entry values that depend on the application, i.e. timeframe, purpose. Based on this address, the method can retrieve the data fragments generated in the first step and reconstruct the data.

3


Quantum-cryptographic access

The addresses generated in the second step are valid only one single time. Each access involves calculating a new address, which is completely different from the previous one. This makes any information that attackers may intercept utterly useless. This means even future attacks using quantum computers stand no chance of calculating NVD-protected data.

We are building the foundation for solutions of the future!

Mentioned enterprises benefit from NVD!

Safe
(autonomous) driving


Apple, BMW, Bosch, Continental, Daimler, Ford, GM, Google, Honda, Infineon, Tesla, Toyota, Uber, VW

Tamper-proof
Smart Grids


ABB, Deutsche Telekom, EON, Gazprom, GDF, Landis+Gyr, KEPCO, Schneider El., SGCC, SMA Solar, S&T

Burglary-proof
Smart Homes


Amazon, Apple, AT&T, GE, Deutsche Telekom, Google, Samsung, Siemens

Data
at your fingertips


AT&T, AWS, BT, China Mobile, EMC, Hitachi, IBM, Microsoft, NetApp, Telefonica, Telekom, Verizon, Vodafone

Replacing asymmetrical
encryption


AMD, Apple, Broadcom, EMC, Foxconn, Google, IBM, Intel, Microsoft, Oracle, Qualcom, SAP

High-security
smartphones


Apple, BBK Electronics, China Mobile, Huawei, Lenovo, LG, Samsung, TCL/Alcatel, Xiaomi, ZTE

Anonymous
digital lockers


BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi, Financial Group, UBS

Controlled data
trade/-rental


BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi. Financial Group, UBS

Blockchain
Optimization


Google, IBM, Microsoft, Unilever, Visa, Walmart

Anonymous,
highsecurity collaboration


Government: Department of Defence, Homeland Security, Army

Tamper-proof and
anonymous voting systems


Governments

Cost-reduced
cyber insurance


Allianz, Axa, MetLife, Nippon Life Insurance, Ping an Insurance, Prudential

Safe (autonomous) driving

Apple, BMW, Bosch, Continental, Daimler, Ford, GM, Google, Honda, Infineon, Tesla, Toyota, Uber, VW

Tamper-proof Smart Grids

ABB, Deutsche Telekom, EON, Gazprom, GDF, Landis+Gyr, KEPCO, Schneider El., SGCC, SMA Solar, S&T

Burglary-proof Smart Homes

Amazon, Apple, AT&T, GE, Deutsche Telekom, Google, Samsung, Siemens

Data at your fingertips

AT&T, AWS, BT, China Mobile, EMC, Hitachi, IBM, Microsoft, NetApp, Telefonica, Telekom, Verizon, Vodafone

Replacing asymmetrical encryption

AMD, Apple, Broadcom, EMC, Foxconn, Google, IBM, Intel, Microsoft, Oracle, Qualcom, SAP

High-security smartphones

Apple, BBK Electronics, China Mobile, Huawei, Lenovo, LG, Samsung, TCL/Alcatel, Xiaomi, ZTE

Anonymous digital lockers

BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi, Financial Group, UBS

Controlled data trade/-rental

BNP Paribas, Credit Suisse, Deutsche Bank, HSBC, ICBC, JP Morgan Chase, Mitsubishi. Financial Group, UBS

Blockchain Optimization

Google, IBM, Microsoft, Unilever, Visa, Walmart

Anonymous, highsecurity collaboration

Government: Department of Defence, Homeland Security, Army

Tamper-proof and anonymous voting systems

Governments

Cost-reduced cyber insurance

Allianz, Axa, MetLife, Nippon Life Insurance, Ping an Insurance, Prudential

Think like us
outside of the box!

 

Think BIG! Think NVD!