FULL LIFECYCLE ENCRYPTION

The security of on-premise combined with all the benefits of the public cloud

WE PROTECT YOUR DATA,
SO YOU CAN FOCUS
ON YOUR BUSINESS.

The fuel and currency of Digital Transformation is data. We help you harness its value, give you back control over who can access it, with whom you share it and who you need to trust, wherever your data happens to be right now.

ABOUT HYKER

THE HYKER DATA PROTECTION SDK

Today's security is not enough. The perimeters of the past no longer protect your assets. You need to maintain control and governance over your data, outside the traditional centralized IT environment. You need to protect your information wherever it is, wherever it is distributed, stored, or used.

We lock down your data over its full lifecycle from a data producer to one or more data consumers, in transfer, at rest, and over time in an unbroken chain. Your security is no longer in the hands of networks or cloud providers. With HYKER trust-based security you design who, where and what you trust.

 

ABOUT HYKER TRUST MODEL

DATA ENCRYPTION

Full lifecycle data lockdown

In transfer and at rest in an unbroken chain

Independent of network and
cloud providers

READ MORE

AUTOMATIC KEY DISTRIBUTION

Granular data access control

Key sharing at decryption,
not encryption

No centralized key escrow

READ MORE

DROP-IN MODULES

No change in the existing infrastructure needed

SDKs for
Java, C++, JavaScript,
Windows, Android, iOS, ...

READ MORE

Customer story

Briteback; End-to-end encrypted chat channels for dynamic groups with full chat history.

GDPR guide

Simplified GDPR Guide and Checklist for SMB

developer program

A developer kick-start into using Hyker SDKs to implement Hyker encryption and key sharing in new or existing applications.

Share confidential documents with an easy-to-use web application. Protected by Hyker.

Some challanges we've solved

Agnostic

One data security solution to cover them all. Works with your data transport, databases, servers, cloud provider, on-premises, everywhere.

Cloud Enablement

You can now move data to a cloud provider of your choice, without having to trust them with security. You keep your encryption keys under full control in your devices. They provide access, storing, scaling, etc.

Decentralized Security

Decentralized security model for decentralized applications, but under full control - you decide what level of centralization that is optimal for your application. No central key storage.

Dynamic Security

Endpoints may come and go, groups may grow and shrink. New members granted access to live and stored data. Granular access control. Full recoverability through delegation mechanisms.

End-to-end Encrypted Pub-Sub

Unique end-to-end protection of publish-subscribe communication protocols, like MQTT, AMQP, XMPP, etc. Independent of networks, devices, and cloud providers. End-to-end protection in IoT. No vulnerable central key storage.

Confidential Public Blockchains

Confidential data assets can be shared on any public blockchain. Share encryption keys on request for decryption.

Secure Open Data

In e.g. Smart City applications multiple data owners can share public applications while maintaining full access control to their data in the common storage. Control who you share with.

Full recoverability

By utilizing Intel SGX we provide the possibility of creating backup or delegated keys in the cloud, without any central access. SGX secure enclave key store as a service.

CYBERSECURITY AS A BUSINESS ENABLER

HYKER provides the protection and security of End-to-End Encryption
but with the dynamic access provisioning and control for the
ever-changing needs of an application, system, and organization.

The result is a complete lockdown of data over the full data lifecycle from a data producer to one or more data consumers, in transfer, at rest and over time in an unbroken chain, protecting your most valuable digital assets.

Cybersecurity that helps you develop business, not lock down business.

Trusted by

Customer cases

The Hyker RIKS Protocol provides end-to-end encryption with history in dynamic groups. Now implemented by Briteback as secure chat channels.

Upcoming Events

May 29 - May 30 | Paranoia 2018

Hyker will both exhibit and have a talk at the Paranoia Cybersecurity Conference Our speech: The Connected Smart City The Smart City consists of a large variety of actors handling the data of the citizens. With a mesh of actors involved, we can no longer trust the security of the infrastructure. Instead, we have to […]

June 20 | AFEP Conference

The Association of Foreign Exchange and Payment Companies (AFEP) is a non-profit association for Authorised Payment Institutions operating in the European Economic Area. Hyker will host Round Table discussions on security and encryption in regards to GDPR and AFEP member challenges.

News

Do you find GDPR overwhelming? Where do I start? What’s applicable to me? Larger organizations often have allocated resources and legal expertise already working on this, but what should you prioritize if your resources are limited?   Take a look at the checklist from Hyker Security and get a feeling of where you and your […]
A take on the evolution of cloud security, and what HYKER brings.
01 June 2017 Defence and security company Saab is launching Hyker Security, a company that will offer security for communicating applications. Over the last few years, the number of intercommunicating applications has increased exponentially, along with the need for secure communications. With today’s complex distribution paths, cyber threats and the EU’s new General Data Protection […]