Start Your Cloud
Web Security Service
Cloud App Assessment
The Importance of Data Security
About Us
With strong background in different programming technologies and tricks our team see huge prospective in emphasizing our efforts on building state of art security solutions for desktop, web and cloud. Having proven track of successfully completed projects in wide range from mobile applications to scalable client-server enterprise systems our team comrises only the best software, architecture and infrastructure gurus. with strong academic and scientific view of modern technologies. Being very customer-oriented company we always take care of our staff and understand that resposible and carefull relations are very important in software business. If you are interested in getting very professional and up to date solution Kvark-Consulting is your right choice in terms of reliability, time and cost!

Cloud Solution
Start Your Cloud
Cloud App Assessment
Cloud Migration
Cloud Development
Security Solutions
The Importance of Data Security
Truly securing the data of your company and your customers is vital to business success. In today’s world of identity theft and data thieves, many small companies are unfortunately ill-prepared to handle the heavy weight of the responsibility they have for this data.
Most small businesses understand the importance of providing secure storage for their customers’ data. After all, they’ve seen the results of improper storage of data. When a company has to send out a letter to its customers informing them that their private information has been compromised, customers begin to think twice about doing business with that company.

Our solution can work with file share cloud services like Google Drive, BoxNet, Dropbox, Microsoft SkyDrive, etc. , it can encrypt files and folders on local hard drive and encrypt email and email databases of mail clients.
Solution uses Elliptic curve discrete logarithm with 1024bit key size, that fully exponential. It’s means that without key decryption of the data becomes impossible.
Base goal of software is encryption files on the fly, this is possible by encryption of file by parts in different streams, that’s utilize computing power and speed up encryption process.
Basic algorithm of the encryption:
1. Split data to encrypt to pieces;
2. Perform simultaneously encryption of each piece of data;
3. Merge encrypted data back;
4. Processes of data upload to cloud services or write to disk.
Features
- Encryption of any folder on disk;
- Support many cloud storage services;
- Email encryption;
- User can define encryption key size;
- User can send encrypted file to other users
Functionality of the solution based on encrypting whole system, not files or folders only, it works through low system kernel operations. Control of encryption for instances provided via Web UI, where user can start, stop or reboot instances, create instances from prepared AMI or convert own running instances to encrypted environment. Web UI have own rules and policy management for the instances activities.
Supported OS
- Windows
- CentOS
- Red Hat Linux
- Ubuntu
- Debian
- SUSE
Cloud services
- Amazon AWS
- RackSpace
- Eucaliptus
- VMware
- vCloud
Features
- Encrypt whole disk
- Encryption of working instances
- Manual and policy based boot sequence control
- Pre-launch authentication
- Key short expiration term
- User friendly UI
Logging levels
- Key press
- SMS\MMS\Email
- Social applications
- Geo Position
- Call Events logging
- Contacts logging
Remote Control
All famous Cloud Services providers work with instances without data encryption. It means all data stored on the cloud is unencrypted and can affect security of business. Cloud Crypto service developed to eliminate this vulnerability of cloud services. It can work with Linux distributions (Ubuntu, Debian, RedHat, CentOS) and Windows distributions under Amazon EC2 and Rackspace.
Mobile Security
Mobile application developed for business data protection cares about logging all employers actions, preventing business information leaks from devices.
Vulnerabilities
Web Security Service
How Hackers Get In (vulnerabilities)
Why You Need To Secure Your Web Applications
Contact
