Use Case
The time when enterprises could use vendors not worry about where data or secrets were stored has passed. Cryptographic sovereignty regulations are impacting every industry and geography, making enterprises responsible for control over their information:
SplitSecure gives enterprises full custody/sovereignty over their information, without technical complexity or burdensome overhead. We have the security claims of an on-prem solution, paired with the simplicity and convenience of a cloud solution.
This is possible because of SplitSecure’s patented architecture. SplitSecure splits secrets across multiple devices within your enterprise, so no single device ever stores the full secret. Secrets split this way can be used normally, but are never persisted or exposed. This network of devices has redundancy, so the loss of a single device does not impair storage, and if an adversary is able to compromise one of your devices, there is no way for them to extract protected information.
For example, when an employee wants to use SplitSecure to log into a sensitive account, they might be part of a team consisting of: their iPhone, their laptop, and our Okta integration. When these three entities agree the user’s access request complies with company policy, access is granted. This is automatic and occurs invisibly in the background.
This approach has four advantages:
Secrets split with SplitSecure are stored on the enterprise’s devices, and the enterprise’s retain full control at all times. They never have to allow a vendor to hold their secrets – even SplitSecure Inc has no access. For enterprises who wish to avoid vendor dependency, SplitSecure can be run locally.
SplitSecure is easy to deploy and easy to integrate with your existing tools. No large or sophisticated cybersecurity team required – any IT person can have SplitSecure up and running in your institution in as little as half an hour.
Since no device in the team ever stores the credentials, it is not possible for the credentials to be extracted from a compromised device. Even if your IT admin’s laptop, phone, and user account were fully compromised, adversaries could not extract the protected information.
SplitSecure is fully customizable to your enterprise’s security requirements. In the above example, the employee logs in using their devices and a single automated integration. But depending on your needs, you could add requirements for integrations with multiple tools, MFA, or human approval. SplitSecure supports everything from logging in to check your email in the morning, to highly sensitive actions that require the approval of multiple humans.
When a user opens SplitSecure, the first thing they see is a list of accounts or tools their organization allows them to request access to. To log-in, they just click on what they want. After that, the organization’s access control rules are automatically enforced, including MFA and additional human-approval steps.
If you’d like to know more about how SplitSecure can help your organization, or if you’d like to see our technical whitepaper to get a better idea of how it works, please contact our sales team.