Companies are increasingly moving from local storage to cloud storage due to increased mobility of users and real-time collaboration applications. However, the biggest risk and the biggest cost involved in migrating a business to the cloud is cybersecurity. Conventional cloud security solutions are technically inefficient and highly profitable due to the current highly centralized platforms and also, due to the multitude of potential sources of attacks.
For this reason, I want to introduce you Cryptyk (CTK), a blockchain-based project that is building the most complete cloud storage and cybersecurity platform in the world. Instead of trying to prevent gaps in data security, Cryptyk assumes that hacking is inevitable and makes the files effectively "safe to hack."
As I said, Cryptyk (https://www.cryptyk.io/) is the first complete cybersecurity and cloud storage solution from a single vendor and dramatically reduces the cost and complexity of cybersecurity for the entire company. Cryptyk's Hybrid BlockChain Technology integrates encrypted decentralized file storage with audit and blockchain monitoring. This hybrid solution effectively mitigates the top five threats to cloud security and provides low latency cloud storage with integrated protection against external, internal, viral, operational and surveillance threats. Thus, the main objective of the platform is to take advantage of the hacking and the risk of the cloud.
Cryptyk's new Hybrid Locking Chain Technology is based on the integration of encrypted decentralized file storage with audit and block chain monitoring. This hybrid solution is passively immune to external, viral and operational security threats, and also allows network administrators to guard against potential internal and surveillance threats.
Feature Description Definition VAULT is a decentralized multi-cloud storage and sharing platform with sub-file level encryption that drastically reduces the potential attack surface for hackers and viruses. Protection against External Threats
Operational Failures / DDoS
Architecture Passively immune
Feature Description Definition SENTRY is a decentralized blockchain platform for auditing, tracking and monitoring all user accesses and shared files, taking advantage of the permanent and unchanging nature of the blockchain. Protection against Internal threats
Intercept / MIM threats
Architecture Audit-Track-Monitor Image Advantage Simple, complete solution from a single vendor Minuscule attack surface Enterprise customers can directly drive up the currency value Low latency
The project gives the opportunity to earn Cryptyk Tokens performing some social media tasks and doing simple steps from the bounty program explained into the following Webpage here (https://www.cryptyk.io/bounty/), where you can access the link in order to see what are the conditions to become an early CTK contributor and start acquiring tokens.
For more information about the project, you can visit and read their WhitePaper available here (https://www.cryptyk.io/files/Cryptyk-Business-White-Paper.pdf). You can also stay tuned in their official Telegram Channel (https://t.me/cryptyk) or in their ANN thread here (https://bitcointalk.org/index.php?topic=2837930.0). I hope you liked the post and soon I'll send you new ones.
Do not forget to visit their Webpage (https://www.cryptyk.com/)!
Token Description Cryptyk Token (CTK) is the new digital currency for cybersecurity and cloud storage. The CTK is a true utility token that offers scalable benefits to all participants, driving an open source cybersecurity ecosystem comprised of third-party application developers, strategic business customers, miners and investors.
Pre-ICO Price: 1 CTK = 0.10 USD
Price in ICO: 1 CTK = 0.125 USD
Tokens for sale: 250,000,000
Events Q4 2015 $250k Angel Investment 2016 Prototype Design + Build Q2 2017 Prototype Test & Analysis Q4 2017 Product Design + White Paper Q1 2018 CTK Token Sale Event Q1 2019 Product Build + Alliance Trials Q2 2019 Final Product Launch
Email: [email protected]
Steemit and Telegram username: @clauming
Ethereum address: 0x91707502A8DFDC523f7a6f2c218cC9a52777d5ad
"Creating Secure Enterprise Cloud Storage with the CTK Token
(Source from https://medium.com/cryptyk/creating-secure-enterprise-cloud-storage-with-the-ctk-token-2c90658c81ce)
For consumers and companies alike, cloud storage is quickly becoming the de facto storage mechanism for the digital age. With most people working from multiple computers, smartphones, and other devices, the broad accessibility of cloud storage is a must."
Read all post here: https://www.cryptyk.io/creatin...
There is no way that a malware file piece can locate all of its other separately encrypted and stored pieces, and hence no way that it can decrypt these pieces, assemble itself, execute and propagate. For all intensive purposes the malware file has been deactivated. pic.twitter.com/WR5TemOUiW— Cryptyk (@TeamCryptyk) 1" class="redactor-linkify-object">https://twitter.com/TeamCrypty... d’octubre de 2018
Cryptyk featured in the Adelaide Advertiser Business Daily
A GROUP of Adelaide entrepreneurs is seeking to raise up to $US25 million to develop a cloud storage platform it believes can compete head-to-head with giants such as Dropbox and Google Drive.
Cryptyk is described by its founders as “the world’s most secure cloud security and storage system” and is being developed by a team of tech and cybersecurity experts in Adelaide and Silicon Valley.
The team is led by chief executive and quantum physicist Dr Adam Weigold, who established laser business Photonica in Adelaide before relocating to Silicon Valley in 2011.
He is supported by a global team including marketing and business development specialist Luke Lombe, computer scientist Daniel Floreani and cybersecurity expert Derek Grocke, who all operate from Adelaide.
A prototype has been built by the Cryptyk team but it is now seeking additional funding through an initial coin offering (ICO) to develop the blockchain-backed technology into a final product. An ICO allows funds to be raised anonymously over the internet by issuing newly created digital tokens.
Cryptyk’s Data Sovereignty and Government Compliance
The balance between government oversight and ownership of data for enterprise.
In this article we explore how Cryptyk allows user control of their data sovereignty in the case of the administrative subpoena; where traditional cloud storage fails. The ability for governments to put pressure on cloud storage providers puts those companies in a grey area, Cryptyk’s hybrid blockchain technology creates a careful balance between serving their users and compliance with government agencies.