Você está na página 1de 2

MerlinCryption | 1008A Castile, Austin, TX 78733 | Contact Brandon Brown | 512.660.

2096

INDOMITABLE DATA ENCRYPTION
WHEN SECURITY MATTERS THERES NO ROOM FOR COMPROMISE!!
Why have billions of records been compromised at Target, Neimans, banking institutions, and healthcare
organizations? Why are encryption keys and passwords the primary target of attack?
With the increasing rate of successful cyber attacks costing the US economy as much as $140 billion
1
, the
Security Industry is highly concerned over the penetration of currently used encryption.
Uncertainty escalates around three known inherent and critical weaknesses:
Risk 1: Out of date algorithms and short fixed-length keys are easier to crack
Risk 2: Key transfer is detectable and predictable
Risk 3: Weak passwords are easily compromised










ASBE speed is twice as fast as AES, yet protects with minimal CPU overhead. The algorithm is ECCN 5D992c
approved for export without a license, OFAC compliant, and provides clients with compliance with HIPAA,
HITECH, and other regulatory guidelines. The technology has 2 patents pending, multiple patents in process.

KEY ADVANTAGE: STAY AHEAD OF THE CURVE
MerlinCryptions patent-pending random data generator outputs keys and passwords that are generated-
destroyed-recreated on demand, making key/password transfer between end-points unnecessary. There is no
key storage or certificates required. PKI is eliminated!

OUTMANEUVER ATTACK: DYNAMIC 4-FACTOR AUTHENTICATION
Dynamic, variable, changeable, encrypted-authentication empowers clients to take control of security.
Authentication is typically based on something you know, something you have, and/or something you are.
MerlinCryption innovates a new category based on dynamic temporary factors. Competing 1- and 2-factor
offerings pale to MerlinCryptions 4-factor options.

MERLINCRYPTION


MerlinCryption
closes the three
jeopardizing risk
gaps in current
encryption security
with irrefutable
Anti-Statistical
Block Encryption
(ASBE)





Contact Brandon Brown | 512.660.2096 2
.


















MERLINCRYPTION



Cloud encryption solutions
are NOT alike!
Data is typically encrypted
locally and transferred to or
through the Cloud.
MerlinCryption secures all
types of data, including
real-time data processing
in the Cloud.
MerlinCryption Data-Cards
defeat key-loggers with a virtual
keyboard and delivers
next-generation USB security to
healthcare, military, financial
services, and other industries.

MerlinCryption
secures diverse VoIP
infrastructures and
configurations. Encryption
security adapts to any or all
interoperable elements and
system layers.
1. http://www.mcafee.com/sg/resources/reports/rp-economic-impact-cybercrime.pdf?cid=BHP016


EMBEDDED ENCRYPTION: BEST OF CLASS INFRASTRUCTURE SECURITY
Encrypted Payloads are transmitted by any communications protocol and on any network
Efficient footprint, as small as 25KB up to 100KB, satisfies constricted CPU requirements
The encryption software is portable to any CPU
API interface with static libraries streamline easy implementation

MerlinCryptions infrastructure security software includes breakthrough embedded encryption,
authentication, and random data generators, for Cloud, VoIP, eCommerce, and USB hardware.

Você também pode gostar