Zero Trust Data

nut     /nət/

:a data container designed for the Zero Trust Architecture

LOGO-C.png

A nut is a data structure that protects any data you put inside it such as unstructured files, directories of files, databases, and applications.

A nut has built-in access control layers which travel with the data in any environment: a location agnostic property of a nut. The security on the data protected by a nut container is consistent across on-premises, off-premises, cloud storages and throughout a supply chain.

A nut directly applies Zero Trust principles on the data object itself in an independent way making central access control systems optional. Data owners set cryptographic technical controls on the payload for sharing at a fine grain level including an industry first: Verify-Only. This property can directly mitigate Insider Threats.

The NUTS ecosystem adheres to Zero Trust Architecture goals by providing its own key management system and utilizing nut containers to store and transport all sensitive data including its keys.

The Zero Trust Architecture goals outlined by the Executive Order of May 12, 2021, Section 10 (k) can be implemented by the use of NUTS technologies. 
 

NUTS Technologies Zero Trust Data

Zero Trust Architecture or model was created in 2010 by John Kindervag. It has gained wide acceptance as the next-generation model. Zero Trust is not a single product, it is all about not trusting anyone or anything inside or outside of your network. With Zero trust, the goal is to be as granular as possible when it comes to protecting your data.


Zero Trust Data (ZTD) is a new framework created by NUTS Technologies. It allows you to move from perimeter-based data protection to data-centric protection. It is a data container that individually wraps every piece of your data or intellectual property. In essence, we brought the security perimeter down to the data layer itself. The data container embeds within it the metadata values to enable these drivers like classification and labeling of data. Embedded access controls and our unique use of data encryption restrict access based on organizational policies.

One of the most unique aspects of the NUT container design is that it is location agnostic. Unlike other data-centric solutions that are tethered to an organization's central system to service and manage the access, the nut container is location agnostic since it carries these values within it; everywhere it may go. This value proposition allows not just for the enforcement of your company’s data policies and access within the organization but easily integrates within your data supply chain across foreign environments on premises, off premises, or in the cloud. 

Hybrid Cloud

Built for Hybrid Cloud storage and data management. NUTS offers data management and data resiliency that integrates with the cloud.

Location Agnostic

A nut container can reside in any storage environment and carry with it content, access controls, and actionable metadata

Secure File Sharing and Sync

Encrypt and share files with a simple 'Drag and Drop'

Trusted Relationships

Zero Trust Cybersecurity: ‘Never Trust, Always Verify’.

Zero Trust Data: 'Privacy by default, privacy by design'

Our fine grain access control at the object layer is portable and carries with the data on-premises, in the cloud , or in the supply chain.

Why now?

The pandemic forced many companies to adopt a work-from-home mode (WFH).  This prolonged period of using the best available WFH technologies has uncovered the realities that the available tech is not all there.

 
This accelerated awareness of the insufficiencies of current WFH tech is helping NUTS highlight its strengths and show that it is the kind of approach that will be needed in the future.


Centralization. Once, we were in the world of mainframes and time-sharing and total centralization. Then, we were thrust into the world of the PC and distributed, independent computing. Now, we are in the world of the cloud where it is like a mainframe spread across a network of computers, in other words, centralization.

 

We need a new flexible model where the user decides whether to centralize or not. A model where centralization is not required. A model where hybrid cloud is natively supported. A model where security is built into the lowest layers. This is the NUTS data model. 

Global Cybercrime Damages
*SOURCE CYBERSECURITY VENTURES

$6T

USD a Year

$500B

a Month

$16.4B

a Day

$684M

an Hour

$190k

a Second

Hybrid Workforce

Post Quantum

Location Agnostic

CIA Triad+

Are You Ready to Defend Your Business?

For more information, pricing, and product download click on the Get Started button