fbpx

Representative offices 

Request callback
btn

Cossack Labs invites you to visit NONAMECON

Conference

The Cossack Labs team has been supporting the NoNameCon conference for several years, which usually passes in spring in Kiev.

This year, thanks to Pandemic COVID-19, the event will take place exclusively in virtual format.

The topics of reports and discussions at the conference are divided into several different directions of cybersecurity: on the 3-rd ofSeptember - Red (Offensive Security), on the 4 -th of September - Blue (Defensive Security).

On the first day, a video interview with the legendary Bruce Schneier is planned, and in the second - reports on post-quantum cryptography, behavior of browsers and antiviruses, creating bots and protection from them.

Also during the conference workshops and debateswill be held with the traditional hacker quiz and online entertainment, including online afterparty..
To register

Back

Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems

Release

Encryption of confidential and personal data is determined by the regulations (GDPR, HIPAA, PCI DSS) and the best practices of the industry. However, the integration of cryptography in the modern application is often a difficult task that has a limited impact on the increase in safety and many architectural compromises. ACRA goal - change this situation.

New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems:

  • Data masking - data is stored in encrypted form, users see disguised data, such as XXXX12. Useful to anonymize data for specific roles / users.
  • Tochenization (Format-Preserving Tochenization) - The data is stored in an encrypted form in a separate storage, while your database stores "tokens" / "pseudonyms" that have the same format and length as the source data. It is useful for creating analytical reports based on confidential data without their disclosure.
  • Ultrafine encryption is a special mode for those who take care of each cycle of the processor and the data storage space. As in other modes, each part of the data is encrypted with a unique key and each key to its key.
  • Flexible search on encrypted data - Now you can search using the "accurate match", "starts with" and "ends on" without deciphering data.

ACRA Enterprise is a comprehensive data protection system. ACRA is used in many infrastructures: software development companies, international financial institutions, energy systems operators and others.

We invite you to cooperate!

Back

Acra Database Protection Suite

Prevent data leakage for your centralized storage systems. Acra provides a number of data security tools and encryption mechanisms that provide multi-layered protection of sensitive data in integrated systems.

Order a demo - version

Encryption of confidential and personal data is determined by regulations (GDPR, HIPAA, PCI DSS) and industry best practices. However, integrating cryptography into a modern application is often a difficult task, which has a limited impact on improving security and many architectural trade-offs. The purpose of Acra Database Security Suite is to change this situation.


Data lifecycle protection is the foundation of security in any software solution. Acra is designed to reduce the risk of data leakage and provide convenient security tools that are used at all stages of the data lifecycle within the software application. Acra Database Protection Suite is easy to integrate, does not require significant changes to existing code, and provides reliable encryption and information leakage prevention in your applications.

Typical uses

  • Protection of personal information (PII) in accordance with the requirements of the GDPR (Articles 25, 32, 33 and 34).
  • Secure data aggregation and centralized access control for distributed and microservice-rich applications, multi-application systems, industrial sensors and other high-performance systems. General protection of sensitive data for web and mobile applications, including the financial, medical and e-commerce sectors.
  • Flexible data protection tools for distributed applications.

Форм-фактор та ліцензування

  • Acra Open-source: ліцензована версія з відкритим ядром Apache 2.
  • Acra Pro: покращена продуктивність, легке масштабування, інструменти управління, виділена підтримка.
  • Acra Enterprise: improved service, high availability, audit log, built-in encryption features, encrypted data search, SIEM support.
  • Acra Enterprise option sets: special extensions for special use cases: SCADA, TimeSeries / Monitoring, deep mobile integration.
  • Acra-as-a-Service: Acra as a service with a secure SQL backend of your choice, pre-configured and integrated.

Modern methods of information security on top of legacy infrastructures

The main advantages of a solution

Encryption and key model:

The Acra Integration Library encrypts the data so that only Acra server components can decrypt it. The Acra solution contains all the necessary key management tools to support the process: key distribution, rotation, compartmentalization.

Realistic security model:

Using Acra assumes that data warehouse components and software applications may be compromised by attackers, but the data itself will remain protected. Acra minimizes data leakage, detects unauthorized behavior, and prevents data loss by notifying operators of an incident.

Reducing the attack front:

The Acra encryption model is based on the fact that no credentials stored in application components should be sufficient to decrypt the data stored in the backend.
Because Acra becomes the only gateway for confidential unencrypted data, the system can perform various checks to detect abnormal / unauthorized behavior and record access to sensitive data.

Acra easily integrates with state-of-the-art software of any complexity, protecting every step of the confidential data lifecycle in your application:

  • AcraWriter mode: integrates the SDK into the client software application to securely generate secure entries in the application.
  • Transparent proxi mode: Configure AcraServer to encrypt records only in the specified columns.
Acra Database Protection Suite Intelligent IT Distribution
en_GBEnglish
ukUkrainian ru_RURussian en_GBEnglish