enterprisesecuritymag

Ubiq Security, Inc.: Breaking Down the Walls, It’s About Protecting the Data First

Follow Ubiq Security, Inc. on :

Wias Issa, CEO, Ubiq Security, Inc.Wias Issa, CEO
Since the early days of computer networking, back when nation states were arguably the only (clandestine) hackers, organizations have relied primarily on perimeter-based, ‘Defense in Depth’ cyber defense strategies to defend their IT infrastructure. The premise was simple: define perimeters or zones within the infrastructure, and then introduce multiple layers of security controls throughout. If one failed, then hopefully another would not. Back then, the strategy was logical, pragmatic, and fairly effective, given the low volume and unsophisticated nature of most cyber threat activity. In short, it was a good enough approach to mitigate a low risk event.

Well, times have changed. Radically. In light of today’s rapidly developing and aggressive threat environment, these types of cyber defense strategies are no longer enough to guarantee protection from bad actors.

In a given year, numerous big-name enterprises and governments worldwide suffer from the increasingly negative effects of sophisticated data breaches. Wias Issa, CEO of Ubiq Security, Inc., believes that the industry’s approach to digital security needs to be updated to reflect the realities of today’s threat landscape. “Firstly, let’s get on the same page about the problem. The volume and sophistication of breaches is growing exponentially. If you look back at every major breach over the last 10 years, in 100 percent of those cases, the bad guys were after the data,” he says.

“Yet, as a (vendor) industry, we have been pushing these perimeter-based concepts to customers, which when you think about it, are no different than the ‘castle approach’ from medieval times,” Issa adds. The industry has been recommending cyber defense strategies that are rooted in 1000-year old military defense strategies. ‘Build a perimeter, then a smaller perimeter, then an even smaller one, and put up defensive positions.’ Sound familiar? It should—just like firewall, IDS, sandbox, and AV/ EDR/EPP. What enterprises require today is a data-first cybersecurity approach. “We know the bad guys are after the data, so let us start our security focus there,” says Issa.

This stance represents a bold new formula, as too many organizations have not embraced data-first security approaches. In many cases, the reason for this disconnect can be found in the complexity of today’s information technology stack. When information is stored in multiple formats across multiple platforms—from cloud and IoT to workstations and servers—the approach can feel overwhelming, if not impossible.

This is where Ubiq comes into play. Ubiq specializes in simplifying security through a multi-patented, data-first platform, ensuring effective data protection at enterprise-scale. More importantly, the platform can expand and contract with business needs, ensuring that data remains protected. This is achieved through innovations that provide the ability to secure any form of data, regardless of its type or native device. Best of all, this can be achieved without sacrificing user experience or system performance.

Ubiq’s proprietary asynchronous multithreading technique (AMT) capitalizes on a system’s idle computing power.

Ubiq leverages a proprietary, multi-patented methodology to ensure stolen data is of no value to the bad guys


Whether a tiny single-core machine or a massive multi-core processor, AMT provides high-performance data security for nearly any device. Issa explains, “Our software stack can be easily integrated into any existing application, IoT device, and can even be installed directly onto severs and endpoints.” These innovations empower enterprise users with the ability to streamline data security with unrivaled transparency.

“If you are still not sold on this innovative technology, consider the fact that Ubiq provides data security without sacrificing flexibility,” asserts Issa. Clients benefit from the efficient securing of data, which guarantees secure transmission between physical computing devices and associated control systems. In other words, Ubiq secures data in all phases of transport, both in-transit and at-rest.

Furthermore, Ubiq offers software development kit (SDK) that runs on most major operating systems, including Linux, Windows, Mac OS, and even Android. This SDK can assist developers in protecting enterprise information on any number of applications and devices.

One of the major outcomes for Ubiq’s customers is that it nearly eliminates the value of data, when it is stolen by the bad guys. To achieve this, Ubiq relies on a patented four-step process of fragmenting, disassociating, encrypting, and dispersing data to a myriad of storage locations. As the first step of this process, fragmentation breaks data into numerous distinct pieces. Secondly, the fragments are then disassociated from each other at random, ensuring that there is no traceable relationship between any of the fragments.

During encryption, every fragment is encoded separately using the AES 256-bit encryption with its own unique encryption key. After encryption, the data fragments can be stored in either one or multiple locations. “Our customers can either store data fragments in the same place or across a number of different locations, all on-premise, in the cloud, or hybrid,” explains Issa. With this approach, even if hackers get access to an organization’s data, they will not be able to make sense of it.

While Ubiq provides many advantages for clients, the seamless user experience provided by its platform stands out as a key feature. Issa comments, “Our platform is designed in such a way that an end-user can carry out their daily work per normal. There is no need to make any changes to their existing workflows or user experience.”

This high performance expands to demanding operations such as data analytics and even next-generation traffic control systems for smart cities. Best of all, Ubiq’s technology is transmission-agnostic, which means it can operate over communications bandwidths ranging from Internet Protocol (IP), cellular networks (3G, 4G, LTE, and 5G), radio, microwave, and even satellite standards. This is achieved through innovations that fosters ultra-low latency and nearly no performance implications, even for real-time services such as video and audio streaming.

Ubiq’s technical capabilities are complemented by valuable partnerships. In fact, numerous Fortune 500 firms, including Verizon, Hitachi, and DLT Solutions have partnered with Ubiq. As of today, Ubiq has a presence in North America, Asia- Pacific, and Japan and plans on further international expansions this year.
Share this Article:

Company
Ubiq Security, Inc.

Headquarters
San Diego, CA

Management
Wias Issa, CEO

Description
As a disruptor in today’s cybersecurity space, Ubiq provides a multi-patented platform capable of securing any form of data, regardless of its type or storage location, without impacting user experience or system performance. The company’s platform easily integrates into existing applications, IoT devices, or can be installed on servers or endpoints. Clients can leverage the solution to trigger faster and more efficient encryption of data transmitted between multiple devices and their control systems, thereby securing information in-transit and at-rest. Ubiq works with organizations globally to ensure that their data is secured transparently while eliminating the vast amount of management complexity of traditional data security solutions