Use Case

SplitSecure for Cryptographic Sovereignty

The time when enterprises could use vendors not worry about where data or secrets were stored has passed. Cryptographic sovereignty regulations are impacting every industry and geography, making enterprises responsible for control over their information:

  • In finance, regulations like Reg S-P, NYDFS TPRM, DORA, MiCA, etc, require financial institutions to demonstrate cryptographic sovereignty – full control over the secrets.
  • The EU, Canada, and other US-partners are pushing to reduce their dependence on US-vendors through a series of data and cryptographic sovereignty regulations.
  • For healthcare providers in the EU, the NIS-2 directive presents major challenges for moving data across borders, forcing providers to always know where their secrets and data are stored.

SplitSecure Solves These Problems

SplitSecure gives enterprises full custody/sovereignty over their information, without technical complexity or burdensome overhead. We have the security claims of an on-prem solution, paired with the simplicity and convenience of a cloud solution.

This is possible because of SplitSecure’s patented architecture. SplitSecure splits secrets across multiple devices within your enterprise, so no single device ever stores the full secret. Secrets split this way can be used normally, but are never persisted or exposed. This network of devices has redundancy, so the loss of a single device does not impair storage, and if an adversary is able to compromise one of your devices, there is no way for them to extract protected information.

For example, when an employee wants to use SplitSecure to log into a sensitive account, they might be part of a team consisting of: their iPhone, their laptop, and our Okta integration. When these three entities agree the user’s access request complies with company policy, access is granted. This is automatic and occurs invisibly in the background.

This approach has four advantages:

Cryptographic Sovereignty

Secrets split with SplitSecure are stored on the enterprise’s devices, and the enterprise’s retain full control at all times. They never have to allow a vendor to hold their secrets – even SplitSecure Inc has no access. For enterprises who wish to avoid vendor dependency, SplitSecure can be run locally.

Ease of Use

SplitSecure is easy to deploy and easy to integrate with your existing tools. No large or sophisticated cybersecurity team required – any IT person can have SplitSecure up and running in your institution in as little as half an hour.

Single Point of Failure Resistance

Since no device in the team ever stores the credentials, it is not possible for the credentials to be extracted from a compromised device. Even if your IT admin’s laptop, phone, and user account were fully compromised, adversaries could not extract the protected information.

Customizability

SplitSecure is fully customizable to your enterprise’s security requirements. In the above example, the employee logs in using their devices and a single automated integration. But depending on your needs, you could add requirements for integrations with multiple tools, MFA, or human approval. SplitSecure supports everything from logging in to check your email in the morning, to highly sensitive actions that require the approval of multiple humans.

User Experience: What A SplitSecure PAM/IAM Solution Looks Like

When a user opens SplitSecure, the first thing they see is a list of accounts or tools their organization allows them to request access to. To log-in, they just click on what they want. After that, the organization’s access control rules are automatically enforced, including MFA and additional human-approval steps.

Contact Sales

If you’d like to know more about how SplitSecure can help your organization, or if you’d like to see our technical whitepaper to get a better idea of how it works, please contact our sales team.

Ready to see SplitSecure in action?

No jargon. No friction. Just stronger security for your organization.
Book a Demo