UPDATED 07:48 EDT / APRIL 16 2015

Ionic Security exits stealth with ‘on-the-fly’ data encryption

privacy-policy-510731_640Another day and yet another security startup exits from stealth. This time around we’re in for something a bit more novel though, because Ionic Security Inc. is touting an unusual ‘on-the-fly’ encryption system that intercepts user’s keystrokes and saves everything in an encrypted fashion even as they work.

Ionic Security works by automatically encrypting all data that’s saved locally, even though the user can still see regular text on screen while using their device. What this means is that unless the attacker is actually monitoring your screen, he or she won’t be able to steal a readable version of your data should he manage to compromise your network’s security.

“We deliver them at just the right time and in the right context that your experience isn’t changed,” said Ionic Security founder Adam Ghetti in an interview. “No key that unlocks the data lives on your device.”

Ghetti told eWeek that even though the firm has only just exited stealth, it’s already accrued a significant user base.

“We have over a million and a half licenses sold across about a half-dozen Fortune 100 enterprises,” Ghetti said.

Ionic Security’s software works by sending out encryption keys over the web, while at the same time circumventing the shadow IT concerns that many organizations have by providing a device-agnostic security approach. It’s product is capable of working with all regular documents and spreadsheets, not to mention emails and common systems such as Salesforce and Yammer.

All data is encrypted with AES-256 symmetric cryptography, while the service simultaneously provides continuous visibility and analytics. The user’s location is also disclosed and is trackable, as soon as they begin to access the data. In addition, the system can also accommodate BYOD policies too.

In recent months we’ve seen the emergence of a number of startups that take an analytical approach to security, with the emphasis on detecting intruders as soon as they enter a network. Ionic Security’s novel approach once again recognizes the most determined attackers will always find a way inside your network if they really want to, and that simply trying to hide behind a firewall just doesn’t cut it in this day and age. That said, Ionic’s technology does have a number of drawbacks – notably, it doesn’t seem to be resistant to installed keyloggers or air-gapped keylogging approaches, and an Internet connection is a must for viewing and encrypting documents.

That said, Ionic Security does promise to be very useful in certain scenarios, hence the $25. 5 million in funding it secured back in February 2014, in a round led by Google Ventures and Jafco Ventures, with additional capital from individuals such as Ken Levine, Phillip Dunkelberger and Dr. Paul Judge, as well as investors such as Venture Capital and Tech Operators.

Image credit: Succo via Pixabay.com

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU