Search
Close this search box.
Categories
News and Events

[Retrospectiva] Cybersecurity in 2022: A year of great challenges and opportunities for companies

The year 2022 was quite challenging for companies in Brazil when it comes to Cybersecurity, where the unceasing destructive power of cyber attacks was shown.

With the consolidation of the digital environment as a business environment, cyber attacks have become constant and a big problem for many Brazilian companies. This has led to CEOs, CIOs, and CISO’s needing to understand the challenges and consider assertive solutions to address them.

On our blog, for example, we show in the article “
CiSOs: key areas to protect your company against cyber attacks
“, we showed besides the importance of the role of the Chief information security officer in the organization, we listed key areas that need to be prioritized by companies.

It was quite challenging, but it also brought opportunities for companies to use technology as a means of ensuring security and data protection.

In 2022, companies must be prepared for the new challenges that cybersecurity will bring.

In addition, it is important to explore the advantages of digital certification, which can be an advanced solution in security and data protection.

Why has investing in Cybersecurity become vital in 2022?

Investing in cybersecurity and protection has become strategic to every company’s business, and 2022 was no different. Cybercriminals have evolved rapidly in recent years, making attacks more sophisticated than ever.

The company becomes vulnerable to loss of confidential data, identity theft, or shutdown of operations by a successful malicious attack if it does not adequately protect itself.

It is worth remembering

In practice, we have seen in the course of the year critical incidents for different types of companies. Some stations were invaded, interrupting their daily programs. Google has also been notified of serious security flaws in its Chrome browser that could result in sensitive data being leaked.

In addition, just like Porto Seguro in 2021, Golden Cross also suffered an attack and had to stop its activities to adjust critical flaws in its technology architecture.

It is also worth remembering that the Banco de Brasília (BRB) was a victim of ransomware, where cybercriminals demanded about 50 bitcoins (R$5.17 million) as ransom for the data not to be leaked.

In the article “It may be too late. 79% of companies only invest in cybersecurity after a data breach“, we address how much companies are at risk today and what the best course of action is to avoid a data breach.

For this reason, it is vital that the structure of your business is equipped with the necessary resources to prevent breaches and maintain data security at all times.

A significant way to improve your organization’s security and data protection, adopted by many companies in 2022, is to implement the use of the digital certificate in business processes.

The digital certificate is an authentication mechanism used in many countries that secures the identity of any user and guarantees their privacy. It helps companies protect confidential information from threats and is a secure way to exchange data between partners, customers, and suppliers.

The importance of adopting the digital certificate and the electronic signature

We showed the importance of adopting the digital certificate and electronic signature in the article “
Why your company should consider using electronic signatures in the sales sector
“showing that different market sectors can benefit from the technology.

In addition, adopting other advanced security tools was also a feature that companies adopted this year and should remain a priority in 2023.

Including security features such as firewall, antivirus, and anti-malware systems has proven to be a strategic investment for companies. These tools are designed to detect potential threats before they can do real damage to the company’s operations.

And speaking of security investments, we published the article “
ROI in cybersecurity: How do you quantify the value of something that doesn’t occur?
“, showing the challenge of quantifying the value of something that is practically intangible.

Besides being a very interesting topic, we show in the course of the publication how to calculate the ROI in cybersecurity. This article is well worth a look.

In addition to cybersecurity challenges, companies also had great opportunities for improvement

We reached the end of 2022 not only with the growth of cybercrime and its challenges, we also had many new developments in terms of technological innovation.

We had, for example, the launch of 5G technology, the new generation of mobile wireless technology. It promises more speed with higher data capacity and lower latency, and the ability to connect many devices at the same time. We deal with this subject in the article “
How to extend user security and privacy using authentication in 5G networks
“.

In addition, we have seen over the course of the year the growth in the importance of ESG for companies and its relationship to technology, cybersecurity, and sustainability. It is worth taking a look at what we published in the article “
ESG: 5 different views on sustainability
“.

In fact, this year, after a long period of pandering, we have seen that companies not only need to be ready for digital transformation. They need to be prepared for drastic changes in the business model.

This is what we saw in the article “
How digital agriculture associated with electronic signature is changing Brazilian agricultural production
“.

Much more than preparing for population growth, sectors of the economy, such as agriculture, have seen the need to adapt. This has caused them to seek a new approach that uses technology to improve efficiency and sustainability.

The automation of contracts and chargeback prevention have also shown themselves to be present in this new reality for companies. The digital medium has become the main avenue for new business, hence the importance of pursuing innovation in business processes.

Be sure to take a look at the articles “
Contract automation: security guarantee for your business
” e “
Don’t be the next company to be a victim of Chargeback
“where we deal with these topics.

The year 2022 was also transformational for EVAL

In this retrospective we could not fail to remember what happened to EVAL during the year. A lot has happened, including the remodeling of our brand and the launch of new products and services.

Important milestones have been reached by the “new EVAL”. We consolidated our participation in the Mind The Sec 2022 event in partnership with Thales.

You can even watch our lecture in the article “Mind The Sec: Eval participates in Latin America’s biggest cybersecurity event“where Abilio Branco, Head of Data Protection at Thales – Brazil, showed how to ensure the protection of sensitive data and accelerate compliance in the era of digital transformation.

Let’s not forget that this year EVAL became a member of the PCI Security Standards Council. This means that we now work with PCI SSC to help protect payment data worldwide through the development and adoption of the PCI Security Standards.

This important milestone was portrayed in the article “
EVAL TECHNOLOGY was approved as a member of the PCI Security Standards Council
“. It is well worth taking a look at what this approval represents, not only for EVAL as a company, but for Brazilian companies dealing with payment methods.

A lot has happened in the course of this year regarding cybersecurity, but 2023 promises even more

There is a lot of progress being made in the field of cybersecurity in recent years and EVAL has done its part in this evolutionary process. This means that there is a lot of anticipation for 2023 when the time comes for these emerging technologies to reach Brazilian companies.

To stay competitive in this highly dynamic field, organizations need to invest in proper training for employees involved in cybersecurity-related processes. In addition, it is necessary to implement preventive measures with a focus on the emerging trends presented in this article.

By doing so, companies can be sure that they are prepared to deal with any digital security threat potentially damaging to their reputation or net income in the near future.

About EVAL

EVAL has been developing projects in the financial, health, education and industry segments for over 18 years. Since 2004, we have offered Authentication, Electronic and Digital Signature and Data Protection solutions. Currently, we are present in the main Brazilian banks, health institutions, schools and universities, and different industries.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval safety is value.

Categories
Data Protection

Security in 5G networks: Extend protection and privacy

The fifth generation of mobile wireless technology (5G), brings more speed, faster communications, and the ability to connect to many more devices at the same time. However, security in 5G networks is still a challenge.

But what does this mean for data protection and privacy?

The fact that 5G supports many different access networks, including 2G, 3G, 4G, and Wi-Fi, means that the new technology may inherit all the security challenges of the networks before it.

5G is the first mobile architecture designed to support multiple specific use cases, each with its own unique cybersecurity requirements.

This poses a major security risk in 5G networks.

For example, 5G will enable IoT applications on a massive scale, such as traffic sensors and vehicle-to-infrastructure services, and is the basis for smart cities.

It is critical that cybercriminals cannot access data, hijack IoT devices, or perform distributed denial-of-service attacks in smart city scenarios.

In fact, security in 5G networks is nothing new for the mobile industry. There is a long-standing importance on security, creating a strong market differentiation from other wireless technologies, some of which have vulnerable network architectures.

Security in 5G networks and authentication must go hand in hand

Today’s networks face a wide variety of threats from different sources and attack routes. The quantity and quality of these attacks increase every year as more points of vulnerability become available in networks and devices.

With IoT at scale, the threat surface becomes quite broad, especially when it comes to services, applications, platforms, networks, and the IoT devices themselves.

In practice, cybercriminals understand the vulnerability of threats related to mobility, edge, and network cores, firewalls, and other interfaces present many opportunities for attack.

Each vulnerability point potentially presents several different types of threats, such as message blocking, denial of service, man-in-the-middle techniques, and more, that can attack authentication, integrity, network availability, and privacy.

With so many exposure points and vulnerability threats, security can significantly strain the resources of the 5G network operator

Fortunately, wireless carriers don’t have to reinvent the wheel. The protocols and security specifications in 5G networks are based on and compatible with the main frameworks developed in 4G.

In addition, 5G offers new security features that use multi-network slicing, multi-tier services, and multiple connectivity capabilities.

To enable the necessary flexibility, agility, and economies of scale, these technologies will be delivered through virtual and containerized environments.

This is a revolutionary way of working for the industry.

The development of 5G standards has adopted ‘Secure by Design’ principles, considering:

  • Use of mutual authentication: Confirm that the sender and recipient have an established trust and the end-to-end relationship is guaranteed;
  • An alleged “open” network: removal of any assumption of safety of the overlapping product(s) or process(es);
  • An acknowledgement that all links can be accessed: Enforce encryption of inter/intra-network traffic, ensuring that encrypted information is worthless when intercepted.

While this is a common practice in solutions for other services, such as Internet Banking, it is a major paradigm shift for existing mobile telecommunications practices.

As a consequence, 5G networks should offer the consumer more protection than existing 4G/3G/2G networks.

Security in 5G Networks: Protecting Users and Devices

Security in 5G networks improves the confidentiality and integrity of user and device data.

Unlike previous generations of 5G mobile systems:

  • Protects the confidentiality of messages between the device and the network: as a result, it is no longer possible to trace the user’s equipment using current attack methodologies on the radio interface, protecting against attacks
    man in the middle
    ;
  • It introduces a protection mechanism called home control: this means that the final authentication of the device to a visited network is completed after the home network checks the authentication status of the device and the connection used. This enhancement will prevent various types of fraud that have historically harmed carriers and address the carrier’s need to properly authenticate devices to services;
  • Supports unified authentication in other types of access networks: allowing 5G networks to manage previously unmanaged and unsecured connections. This includes the ability to perform re-authentication when the device moves between different access or service networks;
  • Introduces user plan integrity checking: ensuring that user traffic is not modified during transit;
  • Enhances privacy protection by using public/private key pairs to hide the subscriber’s identity and derive keys used throughout the service architecture. to hide the subscriber identity and derive keys used throughout the service architecture.

The goal of 5G is to open up the network to a broader set of services and allow mobile operators to support these services. It is an opportunity to protect services and consumers from many of today’s threats.

In practice, 5G comes with many built-in security controls by design, designed to enhance the protection of individual consumers and mobile networks, this is more effective than post-deployment add-ons or extras.

The advancement of technology and the use of new architectures and features, such as network slicing, virtualization, and cloud, will introduce new threats that require new types of controls to be implemented.

Ericsson and Thales partner to offer a solution for secure 5G authentication and user privacy

One of the key components of a reliable 5G network is the integrity of the virtualized infrastructure and the confidentiality of the data flowing within it.

Protecting and authenticating subscriber authentication and privacy presents several challenges, including infrastructure complexity, the distributed nature of 5G networks, the large number of connected IoT devices, the use of multi-vendor networks, and the evolution of 3G and 4G connections.


Ericsson announced its solution

Authentication Security Module

to enhance user privacy security, based on a dedicated physical module for central management of authentication procedures in 5G Core networks.

The solution is powered by the Thales 5G Luna Hardware Security Module (HSM).

The Ericsson Authentication Security Module is a unique solution that supports multi-access (3G/4G/5G) and is pre-integrated with Ericsson’s dual-mode 5G Core for efficiency and reliable deployment flexibility.

The solution is 3GPP compliant, increases network security against cyber attacks, and provides a more secure ecosystem for 5G use cases and business innovation.

To provide the highest level of performance and security for cryptographic keys and algorithms, Ericsson’s solution is powered by the trusted root of the Thales 5G Luna Hardware Security Module (HSM).

The outstanding performance of the FIPS-140-2 Level 3 compliant 5G Luna HSM meets the security, high throughput, and scalability requirements for 5G.

Thales has introduced the 5G Luna Hardware Security Module (HSM) to help Communication Service Providers (CSP) address security challenges.

The 5G Luna HSM delivers up to 1,660 transactions per second (tps) with a single HSM and a PKI hardware-based root of trust, enabling fast and secure scaling from the data center to the edge.

All encryption and encryption key storage, generation and management operations are performed within the secure confines of the 5G Luna HSM, ensuring the protection of subscriber identities, including user equipment, radio area networks (RANs), and your core network infrastructure.

 

Thales and E-VAL can help you with LGPD

Ericsson and Thales partnership benefits

The Ericsson Authentication Security Module and the Thales 5G Luna HSM offer a wide range of benefits for organizations operating in a jurisdiction of strict privacy requirements. These benefits include:

  • React quickly to threats by implementing agile encryption, alternative means of encryption;
  • Prepare your organization for the future by implementing quantum secure algorithms;
  • Added security for your organization’s users and data today and in the future.

With the growing relevance of 5G networks in the communications infrastructure, regulatory frameworks to protect user security and privacy are likely to become even stricter.

By integrating an HSM (hardware security module) based security into leading 5G subscriber data management solutions and service providers will be able to meet the most stringent requirements.

What makes the Thales Luna HSM solution the best option for your company’s needs?

Thales Hardware Security Modules provide the highest level of security by always storing cryptographic keys in hardware.

In addition, they provide a secure encryption foundation, as the keys never leave the FIPS-validated, intrusion-resistant, tamper-proof device.

Since all cryptographic operations take place inside the HSM, strong access controls prevent unauthorized users from accessing confidential cryptographic material.

In addition, Thales also implements operations that make deploying secure HSMs as easy as possible, and our HSMs are integrated with the Thales Crypto Command Center for fast and easy partitioning, reporting, and monitoring of cryptographic resources.

Thales’ HSMs follow strict design requirements and must pass rigorous product verification tests, followed by real-world application testing to verify the security and integrity of each device.

Thales’ HSMs are cloud agnostic and are the HSM of choice for Microsoft, AWS and IBM, providing a hardware security module service that dedicates a single tenant device located in the cloud for the customer’s cryptographic processing and storage needs.

With Thales hardware security modules, you can:

  • Addressing compliance requirements with solutions for Blockchain, General Data Protection Law (LGPD) and Open banking, IoT, innovation initiatives such as the Central Bank of Brazil’s Pix, and prominent certifications such as PCI DSS, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, mass key generation, and data encryption;
  • The keys are generated and always stored in an intrusion-resistant, tamper-proof, FIPS-validated device with the strongest levels of access control;
  • Create partitions with a dedicated Security Office per partition and segregate by administrator key separation;

Therefore, Thales Luna HSMs have been implementing best practices in hardware, software, and operations that make deploying HSMs as easy as possible.

Thales Luna HSMs meet stringent design requirements and must pass rigorous product verification testing, followed by real-world application testing to verify the safety and integrity of each device.

Make the best choice

HSMs are built to protect cryptographic keys. Large banks or corporate offices often operate a variety of HSMs simultaneously.

Key management systems control and update these keys according to internal security policies and external standards.

A centralized key management design has the advantage of streamlining key management and providing the best overview for keys in many different systems.

Learn more about Thales HSM

The encryption keys are literally the key to accessing the organization’s data. They protect an organization’s most sensitive information, so the system that generates and stores it must be protected at all costs.

The Thales Luna HSM not only provides the best physical security, it is usually located at the heart of a company’s secure data center, but also ensures that the stored keys are never tampered with.

Unless you have an environment where a physical data center is not available, adopt an HSM appliance to secure the organization’s encryption keys and leave virtualized services for the rest of your infrastructure, and take comfort in knowing your encrypted connections and data are always secure.

About Eval

EVAL has been developing projects in the financial, health, education, and industry segments for over 18 years. Since 2004, we have offered solutions for Authentication, Electronic and Digital Signature, and Data Protection. Currently, we are present in the main Brazilian banks, health institutions, schools and universities, and different industries.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.

Categories
Data Protection

Health 5.0: Global Revolution with Medical Technologies

With Health 5.0, we are facing a paradigm shift in digital technologies, from traditional health to smart health, which is expected to revolutionize the sector globally.

Smart health incorporates digital technologies to navigate medical information effortlessly, linking individuals, resources and organizations, and then efficiently reacting to the demands of the healthcare environment in an efficient manner.

In practice, smart health connects different stakeholders in the healthcare system, such as patients, professionals, organizations and regulators.

This is achieved with emerging technologies including artificial intelligence (AI), internet of things (IoT), cloud computing, blockchain, 5G connectivity and internet of medical things (IoMT), among other technological innovations that continue to evolve.

These technologies play an important role in the development of the innovative Health 5.0 concept.

Health 5.0 represents a significant boost in innovation

Similar to the automobile industry, the healthcare system has gone through generations, from health 1.0 to smart health, with the revolution in various support sectors.

For example, from 1970 to 1990, many medical systems used paper-based solutions due to the lack of digital technologies.

Healthcare support industries have embraced industry 4.0 and are now moving to industry 5.0. This revolution continues to redefine how modern, digitally high-tech companies improve business operations and increase efficiency across the value chain.

Just like manufacturing, healthcare service delivery is at the beginning of a paradigm shift to reach the new era of health 5.0.

This is a complex era in many respects, including intelligent disease control and detection, virtual care, intelligent monitoring, decision-making and medical science.

The transition from health 4.0 to health 5.0

The gain generated by the boost in digital and medical technologies has led to the development of advanced medical imaging, tracking and healthcare 4.0 systems.

Countries such as the United States, Germany and the United Kingdom have transformed their healthcare systems into a value-based system to improve patient-centered healthcare services through smart, connected care and personalized medicine.

Health 4.0 incorporates the principles and applications of industry 4.0 in healthcare, enabling real-time personalization of care for patients and professionals.

Thus, Health 4.0 supports resilient performance in health systems, which refers to their adaptive capacity to deal with complexity.

Innovative digital technologies adopted in the area of health 4.0 promote real-time customization of patient care and communication between actors in the value chain and the dissemination of health-related information.

The collection of large volumes of data on processes, patients, equipment and materials, processing and transformation of medical data into information, the digitization and automation of health processes, are examples of the advances generated by Health 4.0.

In this context, the process of health service delivery becomes a complex one. system equipped with technologies such as IoTThis will include the use of radio frequency identification, smart wearable medical devices, smart sensors and medical robots, integrated with cloud computing, big data, business intelligence (BI), AI and technical decision support to achieve smart and interconnected healthcare delivery.

However, the lack of recognition, coupled with the shortage of personalized, intelligent and comprehensive medical applications, requiring greater integration of smart sensors, AI and big data has taken it to the next level, making Health 5.0 have a greater focus on customer experience.

Technologies that are part of health 5.0

Emerging digital technologies used in health 5.0 include nanotechnology, 5G connectivity, drone technology, blockchain, robotics, big data, IoT, AI and cloud computing.

Health 5.0 will benefit from nanotechnology applications

Nanotechnology presents unprecedented opportunities to transform health services. Basically, nanotechnology plays a crucial role in therapeutic medicine, rapid diagnostics, surveillance and monitoring, and the development of new forms of personal protective equipment and vaccines.

Nanotechnology involves the manipulation, fabrication, material, modes and use of nanodevices in various applications.

IoT has been widely used in healthcare to connect medical devices and share data over the internet.

There are several emerging variations of sensor-based IoT in healthcare, each with its own peculiarities.

For example, IoT facilitates the introduction of the internet of health things, internet of wearable things, IoMT, among other variations.

These IoT variations provide networked healthcare, which supports the integration of smart medical devices and comprehensive sharing of health data remotely.

For example, smart devices enable remote monitoring in medical services and change the concept of traditional healthcare to smart healthcare.

Thus, through variations of IoT, patient data, sensed by biosensors and smart wearable devices, is remotely accessed, processed and analyzed by medical professionals to improve the delivery of healthcare services.

The inclusion of automation, along with AI, is expected to revolutionize service delivery in Health 5.0

Embedded AI devices based on highly integrated sensors, such as smart wearable devices, help monitor, collect and diagnose diseases from symptoms extracted from sensory data.

Intelligent systems recognize the environment through sensors and take reasonable actions. AI in health 5.0 includes several concepts such as disease detection and diagnosis, development of smart medicines, effective remote monitoring of patients, effective use of robotic surgical systems and the development of smart sensor-based AI devices.

5G technology provides high data throughput and bandwidth

Digital automation of emerging technologies such as robots, AI, smart devices, nanotechnology and cloud computing requires high and continuous data rates to collect, store, reformat and track health data to provide faster and more consistent access.

In this way, 5G technology has become a prime and essential technology for health 5.0 as it provides a high data rate to the user and huge network signal coverage and can handle 1000 times more traffic on the transmission channel.

The growing amount of health data generated from digital technologies is adding value to scientific findings in Health 5.0.

Digital health technologies such as telemedicine, electronic medical records, and other digital health platforms have significantly improved the efficiency and costs of hospitals, along with reducing medical errors and, most importantly, sharing patient data remotely.

In Health 5.0, the future interconnectivity of smart sensors, smart devices and other digital technologies will eventually increase the amount of health data, which results in big data.

This data will eventually be used for disease prevention, detection and monitoring, as well as to provide personalized care. Thus, big data for health 5.0 positions patients and healthcare professionals on the brink of great prospects and is expected to impact medical systems in unprecedented ways.

CipherTrust Discovery and Classification

Emerging digital technologies continue to evolve, presenting unprecedented opportunities for global health systems.

Health 5.0 is at the beginning of a paradigm shift to reach the new era of intelligent disease control and detection, virtual care, smart health management and monitoring, decision making and precision medicine.

This revolution continues to redefine how high-tech digital companies improve healthcare operations and increase efficiency across multiple medical systems to deliver patient-centric healthcare services through smart, connected care and personalized medicine.

CipherTrust for Security and Data Protection in Healthcare 5.0

According to IDC, more than 175 zetabytes of data will be created by 2025, and today more than half of all corporate data is stored in the cloud.

To handle the complexity of where data is stored, CipherTrust Data Security Platform provides strong capabilities to protect and control access to sensitive data in databases, files, and containers. Specific technologies include:

CipherTrust Transparent Encryption

Encrypts data in on-premises, cloud, database, file, and Big Data environments with comprehensive access controls and detailed data access audit logging that can prevent the most malicious attacks.

CipherTrust Database Protection

It provides transparent column-level encryption of structured and confidential data that resides in databases such as credit card, social security numbers, national identification numbers, passwords, and e-mail addresses.

CipherTrust Application Data Protection

It offers APIs for developers to quickly add encryption and other cryptographic functions to their applications, while SecOps controls the encryption keys.

CipherTrust Tokenization

It offers application-level data tokenization services in two convenient solutions that provide customer flexibility – Token without Vault with dynamic policy-based data masking and Tokenization in Vault.

CipherTrust Batch Data Transformation

Provides static data masking services to remove sensitive information from production databases so that compliance and security issues are alleviated when sharing a database with a third party for analysis, testing, or other processing.

CipherTrust Manager

It centralizes keys, management policies, and data access for all CipherTrust Data Security Platform products and is available in FIPS 140-2 Level 3 compliant physical and virtual formats.

CipherTrust Cloud Key Manager

It offers its own key lifecycle management (BYOK) for many cloud infrastructure, platform, and software-as-a-service providers.

CipherTrust KMIP Server

It centralizes key management for the Key Management Interoperability Protocol (KMIP) commonly used in storage solutions.

CipherTrust TDE Key Manager

Centralizes key management for encryption found in Oracle, SQL and Always Encrypted SQL.

The portfolio of data protection products that make up the CipherTrust Data Security Platform solution enables healthcare organizations to protect data at rest and in motion across the entire IT ecosystem and ensures that the keys to this information are always protected and only under your control.

It simplifies data security, improves operational efficiency, and accelerates compliance time. Regardless of where your data resides.

The CipherTrust platform ensures that your data is secure, with a wide range of proven, industry-leading products and solutions for deployment in data centers, either those managed by cloud service providers (CSPs) or managed service providers (MSPs), or as a cloud-based service managed by Thales, a leading security company.

Tool portfolio that ensures data protection

With data protection products from the CipherTrust Data Security Platform, your healthcare organization can:

Strengthening safety and compliance in Health 5.0

CipherTrust data protection products and solutions address the demands of a range of security and privacy requirements, including electronic identification, authentication, and trust, Payment Card Industry Data Security Standard (PCI DSS), General Data Protection Law (LGPD) together with the National Data Protection Authority (ANPD), among other compliance requirements.

Optimizes team and resource efficiency

CipherTrust Data Security Platform offers the broadest support for data security use cases in the industry, with products designed to work together, a single line for global support, a proven track record of protecting against evolving threats, and the industry’s largest ecosystem of data security partnerships.

With a focus on ease of use, APIs for automation, and responsive management, the CipherTrust Data Security Platform solution ensures that your teams can quickly deploy, secure, and monitor the protection of your business.

In addition, professional services and partners are available for design, implementation, and training assistance to ensure fast and reliable implementations with minimal staff time.

Reduces total cost of ownership

CipherTrust Data Security Platform’s data protection portfolio offers a broad set of data security products and solutions that can be easily scaled, expanded for new use cases, and have a proven track record of protecting new and traditional technologies.

With CipherTrust Data Security Platform, healthcare institutions can prepare their investments for the future while reducing operational costs and capital expenditures.

About Eval

EVAL has been developing projects in the financial, health, education and industry segments for over 18 years. Since 2004, we have offered Authentication, Electronic and Digital Signature and Data Protection solutions. Currently, we are present in the main Brazilian banks, health institutions, schools and universities, and different industries.

With value recognized by the market, EVAL’s solutions and services meet the highest regulatory standards of public and private organizations, such as SBIS, ITI, PCI DSS, and LGPD. In practice, we promote information security and compliance, increase companies’ operational efficiency, and reduce costs.

Innovate now, lead always: get to know Eval’s solutions and services and take your company to the next level.

Eval, safety is value.