icohunter7991
Newbie
Offline
Activity: 26
Merit: 0
|
|
May 22, 2018, 11:43:08 PM |
|
Block-chain is very in these days and I think this project is doing great as it enables the users to secure their assets stored in the cloud using block-chain technology. Instead of relying on a single private key stored on a server that can be hacked or stolen. This project is a goal!
|
|
|
|
Simon 66
Newbie
Offline
Activity: 26
Merit: 0
|
|
May 23, 2018, 03:28:05 AM |
|
AI and blockchain both technologies, put to work together, can fuel the creation of unimaginable new business solutions, allowing AI systems to perform friction less and transparent and transactions, without human intervention, in the universe of the Internet of Everything (IOE).
|
|
|
|
trongtabk961
Newbie
Offline
Activity: 23
Merit: 0
|
|
May 23, 2018, 03:51:41 AM |
|
somboedy give me link to wed ?
|
|
|
|
stiles.99
Newbie
Offline
Activity: 7
Merit: 0
|
|
May 23, 2018, 04:22:26 AM |
|
ICO has proven to be a valuable real-time asset in the information age. As the days go by ICO is attracting more and more sectors both for businesses as well as commercial purposes. Initially finally played a vital role in cryptocurrency market. Now providing the huge efficiency the application of ICO are intensified. Cloudfish ICO is the good one based on blockchain technology.
|
|
|
|
liam spencer
Newbie
Offline
Activity: 20
Merit: 0
|
|
May 23, 2018, 04:30:47 AM |
|
ICO has proven to be a valuable real-time asset in the information age. As the days go by ICO is attracting more and more sectors both for businesses as well as commercial purposes. Initially finally played a vital role in cryptocurrency market. Now providing the huge efficiency the application of ICO are intensified. Cloudfish ICO is the good one based on blockchain technology.
I also keep studying blockchain projects, and feel that Cloudfish project is gaining momentum.
|
|
|
|
David97
Newbie
Offline
Activity: 26
Merit: 0
|
|
May 23, 2018, 10:22:42 AM |
|
you will be transferring responsibilities for information security to the cloud provider. You need a platform which provides you tools to protect your data. Choose Cloudfish and make your data secure and safe!
|
|
|
|
Miles Max
Newbie
Offline
Activity: 23
Merit: 0
|
|
May 23, 2018, 10:24:34 AM |
|
I actually think that the cloud is more secure Smiley The truth is that security patching is more streamlined in the cloud where there are dedicated staff ensuring security standards. To be reassured of the level of security and reliability your data is getting in the cloud, examine closely the cloud service provider’s security policy.
|
|
|
|
rockerzofIco
Newbie
Offline
Activity: 100
Merit: 0
|
|
May 23, 2018, 05:00:39 PM |
|
In CloudFish the Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
May 23, 2018, 05:14:56 PM |
|
Cryptocurrency is a digital currency for which encryption techniques are used to regulate its use and generate its release. Unlike fiat currency — like US dollars, euros and yen — cryptocurrency is not regulated or controlled by any bank, government or centralized financial authorities.
Instead, it relies on the power of the Internet to guarantee its value and confirm transactions. Users on a network verify every transaction, and those transactions then become a matter of public record. This prevents the same digital currency or coin from being spent twice by the same person.
|
|
|
|
Thomas (Tom)
Newbie
Offline
Activity: 40
Merit: 0
|
|
May 24, 2018, 08:43:17 AM |
|
your announcement could be better, as I think. but I was pleased with your road map, you have big plans and this is a sign of the team's interest in success
it is necessary When evaluating a coin, token, or ICO, it is worth looking into what their road map looks like. Roadmaps give you a sense of what the team behind the Project have in mind for the future, as well as telling you how confident they are that they will achieve their goals. I also love a neat roadmap , very innovative, very good..!
|
|
|
|
Risen4610
Newbie
Offline
Activity: 44
Merit: 0
|
|
May 24, 2018, 09:18:04 AM |
|
Evaluating ICO’s has become the most difficult task. Depending on rating sites is not advisable, as they are all paid reviews and rating. There also many blogs who misguide and keep calling ICO’s spam, to extract money from ICO promoters, so that they pay them to remove their reviews saying their ICO as spam. So I personally myself research all the ICO’s thoroughly and then invest in this promising ICO.
|
|
|
|
deviss313
Newbie
Offline
Activity: 23
Merit: 0
|
|
May 24, 2018, 09:30:00 AM |
|
Evaluating ICO’s has become the most difficult task. Depending on rating sites is not advisable, as they are all paid reviews and rating. There also many blogs who misguide and keep calling ICO’s spam, to extract money from ICO promoters, so that they pay them to remove their reviews saying their ICO as spam. So I personally myself research all the ICO’s thoroughly and then invest in this promising ICO.
it seems so,I am also sure will more and more participants will join this project and enliven this project. success is always this project.
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
May 24, 2018, 03:08:13 PM |
|
An organisation moving sensitive business data to a cloud environment must take secure steps to ensure that its data is safe, genuine and accurate. Failing to do so can have both legal and operational consequences. It is therefore important to take data integrity into account as part of the due diligence process when selecting cloud providers.
|
|
|
|
rockerzofIco
Newbie
Offline
Activity: 100
Merit: 0
|
|
May 24, 2018, 04:12:11 PM |
|
Cloud computing changed the world around us. Now people are moving their data to the cloud since data is getting bigger and needs to be accessible from many devices. Therefore, storing the data on the cloud becomes a norm. However, there are many issues that counter data stored in the cloud starting from virtual machine which is the mean to share resources in cloud and ending on cloud storage itself issues.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
May 24, 2018, 04:19:45 PM |
|
CloudFish developed a proprietary technology that encrypts the digital enterprise assets like documents, emails, IPAs, crypto-currencies etc. It then splits the encryption key into millions of pieces and distribute it on block-chain thereby making it virtually impossible for a hacker to decrypt and steal the sensitive data. The dynamic key split and reconstruction mechanism on block-chain is a proprietary technology of Cloudfish for which a patent is in-progress.
|
|
|
|
liam spencer
Newbie
Offline
Activity: 20
Merit: 0
|
|
May 25, 2018, 03:34:03 AM |
|
Worried about maintaining your security and compliance during your move to the cloud? Get Cloudfish and stop worrying about your data getting hacked.
|
|
|
|
Simon 66
Newbie
Offline
Activity: 26
Merit: 0
|
|
May 25, 2018, 09:35:00 AM |
|
a good idea with blockchain technology. I hope this project runs smoothly and get a lot of support.
|
|
|
|
stiles.99
Newbie
Offline
Activity: 7
Merit: 0
|
|
May 25, 2018, 09:38:44 AM |
|
Project looks interesting! (Y) I have a question. What makes this coin superior to Storj ?
Thanks for your compliments. Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space. CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI). Cloud Access Security Broker (CASB)The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions. The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked. Cloud Data Encryption InterfaceThe Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider. In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud. CLOUDFISH CLOUD SERVICES GATEWAY (CSG)CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server. The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers. The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each. Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network . Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise. That is a pretty new thing now, hopefully will achieve good results
|
|
|
|
Alizy.20
Newbie
Offline
Activity: 15
Merit: 0
|
|
May 25, 2018, 10:49:47 AM |
|
The security platform developed by CloudFish is integrated with major cloud services vendors including Dropbox, Google Drive, Box and Microsoft OneDrive.
|
|
|
|
Allison Jane
Newbie
Offline
Activity: 32
Merit: 0
|
|
May 25, 2018, 10:56:45 AM |
|
Maintaining the security of your cloud is a really hard task! If you think it's not a big job then you might be missing someting because security of a cloud requires much hard work. The developers of Cloudfish worked day and night to make it a platform which can provide security.
|
|
|
|
|