Helix SDK: the first end-to-end encryption solution that protects your data at rest, in transit and during use with five layers of encryption, and two layers of key exchange, providing dual Perfect/Future Forward Secrecy as well as dual Post-Quantum computing attacks resilience.
– DNA Binding™ customizes the encryption based on the recipient and their device’s hardware to ensure that only the intended recipient can decrypt and see the content even if it is intercepted – you cannot steal what you cannot see. It provides “Kevlar” for your data.
– 5 layers of Encryption (AES1, TwoFish, AES2, ThreeFish, Snow3G) providing true end-to-end encryption – encrypting at a rate that’s 1000x faster than SSL/TLS, optimizes security while actually improving performance.
– Quantum Resistant – Encryption ensures post quantum attack resilience for your data & communications as well as for the key exchange mechanism.
– Global Key Exchange Service with 2 layers of protection for encryption keys that are integrated to seamlessly and automatically establish a shared secret & encrypt the 5 symmetric keys used to encrypt the data, in order to be sent securely to the recipient. It prevents/avoids compromise and impersonation. The Global Key Exchange could be on cloud (yours or ours) or on premises.
– Dual P/FFS (perfect/future forward secrecy) means keys used for encryption and key exchange are randomly generated, used only once, discarded, and never used again. Changing keys makes it exponentially harder (if not impossible with the current technology) to gain unauthorized access to the data.
Auditing/Penetration Testing: as part of our holistic approach to cybersecurity, we provide cyber auditing & penetration testing services in order to identify the gaps in your network, cloud, communications, network appliances, wireless networks, laptops, desktops & mobile devices, website, backup and 3rd party applications and services. Once we scan your systems, we provide a comprehensive report and our recommendations for remediation.
Ransomware Auditing as a Service (RaaS): ransomware attacks have skyrocketed in the past year and currently represents the biggest threat to the data of government agencies, military, intelligence agencies as well as private enterprises. BLAKFX developed the first in the world Ransomware Auditing as a Service (RaaS) platform which allows our cyber security engineers to scan your network and simulate real-world ransomware attacks to determine the test the prevention, detection and mitigation strategies of your organization and establish how resilient your network is to real ransomware attacks. After the scan we provide a comprehensive report and our recommendations for remediation.
MSS & Insider Threat Prevention: BLAKFX has a national security level Secure Operations Center that can monitor your network (via our Managed Security Service) for threats & vulnerabilities as well as your employees via threat behavioral analysis techniques in order to stop threats (including insider threats) before they become a problem for your network, data and organization.
TSCM: many organizations and government agencies are aware of the threats posed by hacking surveillance and data theft but are not aware that Technical Surveillance Counter Measures and Electronic Security are an essential component of overall risk mitigation. BLAKFX’s access to the most sophisticated equipment, military and intelligence community level RF frequencies monitoring expertize is unique in the world.
Physical Security: part of the BLAKFX’s overall holistic security protection are also physical security services and designs for your buildings, data centers, cloud providers, airplanes, vehicles and personnel security. We provide full physical security planning, insider threat detection and prevention, physical security audits, certification and security awareness training.
Global Governments: (restrictions apply) Click here to request information & quotes
*Secure Phones: part of the BLAKFX’s suite of secure products, we are pleased to offer governments, law enforcement, intelligence agencies, military forces globally and enterprises, a fully end to end encrypted phone, with secure messenger, secure email, secure news, secure audio/video calling & secure conference calling.
OSINT: the Collection Platform provides real time comprehensive view of collected intelligence from various sources. The system allows for more effective operation management by allowing the operators to control all available intelligence gathering tools from a single, unified dashboard. By allowing centralized control, alongside presentation of key intelligence and insights the overall operational effectiveness is significantly increased.
The Analytics Platform system fuses all field intelligence meta-data and cyber intelligence content, as well as other data sources, to highlight and identify suspicious activity, important events and analyze suspects’ relationships and communications. The system can provide in-depth operational understanding in near-real-time to the field operations teams.
Pre-Crime, Data Fusion and Big-Data Analysis: a full range of capacity for big data analytics. Analyze billions of events, merge data from heterogeneous sources, reveal weak signals and understand the digital behavior of a target are some of the numerous features of the Analytics Center. It’s composed of modules like Analytics, Profile, Relational and Predictive.
LLDDS: Low Level Defender Drone System consists of three essential elements, the first of which is our Ground Based Sensor Node (GBSN). The GBSN employs a very low power, high sensitivity FMCW radar system, functionally integrated with a complementary video/IR detection and confirmation system. The GBSN is controlled by AI and by either a single on-site operator or via remote operator control over our fully secure Command, Control and Communications (C3) SatComm-based network. The second element in the System is a medium endurance, low-level, missile-armed defender drone. This critical airborne asset will provide: persistent or on-demand zone protection including airborne patrol, target identification, target confirmation, and attack. This unmanned, very capable platform is the attack and deterrent end of the LLDD defense chain. It is continuously and closely monitored and controlled by AI and a Controller/Operator – in real-time – via the LLDD C3 SatComm Network. Our highly automated and minimally manned concept employs proven off-the-shelf, ground-based and airborne sensors and platforms combined with proprietary BLAKFX technology.
Note: Items marked with * are available for enterprises as well