All posts by admin

Zero Trust Storage™ –  “Never Trust, Always Verify”

Although the concept of Zero Trust Architecture was introduced several years ago by John Kindervag, VP for Forrester Research, based on the principal of “Never Trust, Always Verify”, it has only recently been gaining popularity in wake of growing cyber-attacks
The National Institute of Standards and Technologies (NIST) defines cyber-security standards, one of which is SP 800-207 “Zero Trust Architecture.

Our Zero Trust Storage™ is based on the Zero Trust Architecture and used in several NIST projects for Data Integrity, Data Confidentiality, and protection of Industrial Control Systems including robotics and audit systems.  This security is enforced by hardware so it cannot be bypassed. It is used by NCCoE SP 1800-25 & 1800-11 for “Protection and Recovery from Ransomware and other Destructive Events”.

 

NBC News Secure Immutable Video for Police cameras

Law Enforcement video plays a critical role in protecting both the officers and the public.

Body-worn and vehicle-based police cameras record interactions and confrontations between law enforcement officers and the public.  In order to ensure that surveillance video is not lost, destroyed or edited, it must be immediately saved onto immutable storage devices.

NBC news channel 4 interviews the President of GreenTec-USA to understand how law enforcement agencies can easily save their video so that it is permanently protected and managed for effective use.

Watch this video

ABC News Ransomware and Survivable Data

Ransomware attacks are more prevalent than ever.

With a growing threat that anyone is vulnerable to a Ransomware attack that will hold your data hostage, demanding payment in bitcoin or other cyber-currencies to get your data back.
ABC news anchor Garret Morris interviews the President of GreenTec-USA to learn how secure storage technologies will prevent damage caused by Ransomware and other cyber-attacks.
These unique and easy to use storage devices work with standard applications, file systems and file formats to automatically protect valuable data.
Watch this ABC News Video.

NIST Technologies for Data Integrity, Data Confidentiality & Ransomware Protection

The National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) develops best practices for data security and protection from cyber-attacks.
GreenTec WORMdisks™, ForceField™ and CYBERdisk™ technologies are used as the secure storage for several NIST and DHS projects including:

NIST SP 1800-25 “Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

NIST SP 1800-11 “Data Integrity: Recovering from Ransomware and Other Destructive Events”

NIST SP 1800-10 “Protecting Information and System Integrity in Industrial Control System Environments

DISA Testing and Report: “Assessment Report GreenTec WORMdisk and CYBERdisk

DHS Cybersecurity and Infrastructure Security Agency (CISA) CDM Approved Products List (APL): GreenTec Zero Trust Storage

Defense Information Systems Agency (DISA) WORMdisk & CYBERdisk Test Validation

The Defense Information Systems Agency (DISA) manages the IT systems for the Department of Defense (DoD) which require strengthened data and systems security measures against constant cyber-attacks.

DISA has tested and validated the data integrity of the WORMdisk™ and CYBERdisk™ Zero Trust Storage technologies and produced a report that states “The GreenTec WORMdisk product allows for permanent unchangeable storage of data onto a hard disk medium. The CYBERdisk product allows for protection of a boot hard disk where the Master Boot Record (MBR) is unalterable. The two products perform as advertised.”

GreenTec-USA Solution Would Prevent Sony Attacks and Ransomware

The Press Release of a hacker’s technological breakthrough by figuring out how to lodge malicious software in the obscure code on disk drives is viewed by cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.
GreenTec-USA, in cooperation with Seagate Technologies, developed a secure electronic information storage product breakthrough referred to as the WORMdisk™, which cannot be re-flashed, overwritten, reformatted, deleted, or otherwise changed.

The WORMdisk™ functions as a normal HDD with zero performance degradation from its additional built-in capabilities.  The WORMdisk™ is the only HDD of its type available that makes it impossible to alter, modify, edit, re-format or delete data on the disk, the master boot sector, or the on-board technology that controls the disk, regardless of computer operating system or access permissions.

In short, if using WORMdisks, this attack will not work and cannot effect a company’s important data, launch malware to take control of the PC, delete, modify or impair the master boot record or re-flash the firmware. Additionally, other important files such as log files, access permission and user rights cannot be deleted or modified by hackers.

Secure Your World with Zero Trust Storage™ Technologies & Devices

GreenTec Zero Trust Devices™ are used as the secure storage on four best practice projects with the NIST NCCoE for “Data Integrity and Protection from Ransomware and other Destructive Events”, “Data Confidentiality” and “Protecting Information and System Integrity in Industrial Control System Environments”.
  • ForceFieldZTS™ Automatically protect each written data block in real-time. Prevents disclosure, sabotage, manipulation, deletion and Ransomware.  The secure storage used for the NIST Data Integrity (DI) and Data Confidentiality (DC) standards and for Industrial Control Systems (ICS).
  • WORMdisk™ ZTS™ Protected data on conventional file systems is secure from Ransomware, unauthorized or accidental deletion or re-formatting. Cannot be held hostage with RansomWare viruses.
GreenTec’s unique secure ForceFieldand WORMdisk™ provides data protection at the hardware device level against:
  • Unauthorized data modification
  • Data Deletion and data loss
  • Ransomware attacks
  • Data Exfiltration
  • Device Re-formatting
  • Firmware viruses and modification
  • Insider threats
  • Human error and
  • Other cyber-threats that may sabotage or manipulate data

Secure Telework Shared Files with Easy Built-in Encryption

GreenTec has announced the new ForceField Web server for small and home offices to provide secure access for working from home, at the office, or remotely.

ForceField™ Web provides your own secure private web server in a small footprint that you can put anyplace, including on the back of your computer monitor. ForceField™ Web lets you access to all of your data files, when you need them, from any web browser or device and may be shared with Windows, Linux, macOS users.

Use external secure ForceField™ disk drives and thumb drives, or let ForceField™ secure your data in the Cloud.  ForceField™ Web can automatically synchronize and securely backup your data to other private storage or into the Cloud.  ForceField™ devices are plug-and-play, connect and disconnect individual devices as needed.

Files saved may be automatically encrypted simply by providing a file userid and password.  The encryption keys themselves are also encrypted providing a two-factor authentication required to decrypt files (they key plus the file userid and password).  Key mirrors are created for additional safety.

Access to any of the ForceField™ devices requires users to be granted permission to “see” the device.  Additional file authentication enables authorized users to decrypt and see the contents of individual files.

ForceField™ audit logs are in CSV format so that may easily be imported into Excel or any SIEM system.

Safely access files from any device or in the cloud

Web-based Zero Trust Storage™ provides easy, safe and secure access to your data from laptops, tablets, smartphones, on-prem or hosted servers and from the cloud.
Only data blocks which are accessed are decrypted on-the-fly which means that all data on the storage device remains encrypted at all times. So even if a hacker penetrates your firewalls, operating systems, or applications, the data remains scrambled so they cannot read your files.

Simple web browser interface enables you to securely upload and encrypt, or download and decrypt authorized files easily and safely.