scott mak
Newbie
Offline
Activity: 7
Merit: 0
|
|
June 19, 2018, 11:20:10 AM |
|
This is fulfilled par excellence by the CLOUDFISH architecture and the smart contract. Personal data is being stored encrypted and only the consumer who is the owner of the data has the key for its decryption.
|
|
|
|
Thomas (Tom)
Newbie
Offline
Activity: 40
Merit: 0
|
|
June 20, 2018, 05:06:55 AM |
|
When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks and outsourcing of infrastructure components.Companies still fear that their data is insecure with cloud systems. Businesses are moving their data from on-premise servers to cloud. And second, as the block- chain assets’ market like crypto-currencies is getting traction, the business decision makers are planning to diversify their assets and invest in the crypto-currencies. The commercial security products and crypto-currency wallets available in the market today, rely on encryption-based security using a single private key that is stored either on a local computer or an external cloud server. If the key is lost, stolen or hacked, the digital asset is lost. This creates the need for an enterprise class solution that provides a more robust and unified security solution not only for the digital assets like documents, files, emails etc. but also for the crypto-currency assets stored in the cloud. Security breaches in external cloud servers, internal and external intrusions and hacking by individuals and foreign governments poses a critical threat to the enterprise data stored on commercial cloud servers. The security of the cloud server is managed by the cloud service providers and the companies have little control over the security of their data and no significant legal remedies if their data or crypto currency assets are compromised on the cloud server.
You're right, the digital world is a blessing but it comes with massive risks, so anything that will curb the negative issues we face everyday on the web, should be commendable, sometimes it gives one the creep anytime you think about logging into your accounts or wallets, is not just a safe place, we need protection
|
|
|
|
Tom Welling
Newbie
Offline
Activity: 14
Merit: 0
|
|
June 20, 2018, 11:18:58 AM |
|
Honestly I am just so happy about the progress of this project. I can't wait to enjoy all the benefits that come with it also.
|
|
|
|
Felicity no.1
Newbie
Offline
Activity: 50
Merit: 0
|
|
June 20, 2018, 11:39:26 AM |
|
The CloudFish Cloud Service Gateway provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers.
|
|
|
|
catwoman97
Newbie
Offline
Activity: 19
Merit: 0
|
|
June 20, 2018, 06:38:51 PM |
|
The future belongs to cloud computing, but only with the help of strong security. I am sure this project will provide the best security to its users!
|
|
|
|
Simon 66
Newbie
Offline
Activity: 26
Merit: 0
|
|
June 21, 2018, 09:33:41 AM |
|
Security on cloud is paramount. No matter if you have the cloud security strategies in place, continuously monitoring and auditing your cloud infrastructure to spot and heal the vulnerabilities way ahead of time is a challenge that most businesses are facing today. CloudFish is the best choice.
|
|
|
|
Sharjeel.97
Newbie
Offline
Activity: 61
Merit: 0
|
|
June 21, 2018, 10:18:49 AM |
|
ICO stands for "initial coin offering," and refers to the creation and sale of digital tokens.
In an ICO, a project creates a certain amount of a digital token and sells it to the public, usually in exchange for other cryptocurrencies such as bitcoin or ether.
The public could be interested in the tokens on offer for either or both of the following reasons:
1) The token has an inherent benefit – it grants the holder access to a service, a say in an outcome or a share in the project's earnings.
2) The benefit will be in increasing demand, which will push up the market price of the token.
Tokens, especially those of successful sales, are usually listed on exchanges, where initial buyers can sell their holdings and new buyers can come in at any time.
As a type of digital crowdfunding, token sales enable startups not only to raise funds without giving up equity, but also to bootstrap the project's adoption by incentivizing its use by token holders.
Buyers can benefit from both the access to the service that the token confers, and from its success through appreciation of the token's price. These gains can be realized at any time (usually) by selling the tokens on an exchange. Or, buyers can show their increasing enthusiasm for the idea by purchasing more tokens in the market.
|
|
|
|
Risen4610
Newbie
Offline
Activity: 44
Merit: 0
|
|
June 21, 2018, 10:45:38 AM |
|
I wish you success! Absorbing idea, spotless approach, informed idea!
Exactly my interest in the project, i believe the buzz are coming in for the project soonest especially with the fact that the team are readily available to take on question thrown at them
|
|
|
|
liam spencer
Newbie
Offline
Activity: 20
Merit: 0
|
|
June 21, 2018, 12:36:35 PM |
|
ICO stands for "initial coin offering," and refers to the creation and sale of digital tokens.
In an ICO, a project creates a certain amount of a digital token and sells it to the public, usually in exchange for other cryptocurrencies such as bitcoin or ether.
The public could be interested in the tokens on offer for either or both of the following reasons:
1) The token has an inherent benefit – it grants the holder access to a service, a say in an outcome or a share in the project's earnings.
2) The benefit will be in increasing demand, which will push up the market price of the token.
Tokens, especially those of successful sales, are usually listed on exchanges, where initial buyers can sell their holdings and new buyers can come in at any time.
As a type of digital crowdfunding, token sales enable startups not only to raise funds without giving up equity, but also to bootstrap the project's adoption by incentivizing its use by token holders.
Buyers can benefit from both the access to the service that the token confers, and from its success through appreciation of the token's price. These gains can be realized at any time (usually) by selling the tokens on an exchange. Or, buyers can show their increasing enthusiasm for the idea by purchasing more tokens in the market.
Definitely jumping all over this. security is a huge issue in the world and everyone can benefit from this project.
|
|
|
|
Thomas (Tom)
Newbie
Offline
Activity: 40
Merit: 0
|
|
June 22, 2018, 06:39:39 AM |
|
Having in mind that the threats are always on and hackers lurk everywhere in the cyber space, i beleive that projects like this add value to the blockchain technology implementation.
|
|
|
|
J@mes
Newbie
Offline
Activity: 20
Merit: 0
|
|
June 22, 2018, 10:06:21 AM |
|
The importance of security these days cannot be stressed enough. Security is the forefront of cloud. I think this project is the platform which can provide us security at its best.
|
|
|
|
Miles Max
Newbie
Offline
Activity: 23
Merit: 0
|
|
June 22, 2018, 10:09:28 AM |
|
If you want to enjoy better privacy, always look for cloud storage services that offer local encryption for your data. CloudFish developed a multi-tier encryption based security model that leverages block chain to secure encryption keys.
|
|
|
|
sebastian vettel
Newbie
Offline
Activity: 7
Merit: 0
|
|
June 22, 2018, 10:10:36 AM |
|
Security technologies are evolving, and enterprises have more access to cloud security tools that provide the control and visibility they crave. New environments, such as hybrid and multi-cloud, can create additional gaps and vulnerabilities, but tools, such as cloud access security brokers, now target those unique attack surfaces. By forming a comprehensive strategy, enterprises can take a proactive approach against cloud security challenges and risks.
|
|
|
|
scott mak
Newbie
Offline
Activity: 7
Merit: 0
|
|
June 22, 2018, 10:13:57 AM |
|
I predict because of the blockchain technology CloudFish-a key innovator in cloud security software built on blockchain will play a vital role for cloud security and the team looks pretty good which is a mixture of blockchain technology expert and software giant having three decade experience.
|
|
|
|
David97
Newbie
Offline
Activity: 26
Merit: 0
|
|
June 22, 2018, 10:17:00 AM |
|
In CloudFish the Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider.
|
|
|
|
JenniferMa
Newbie
Offline
Activity: 28
Merit: 0
|
|
June 22, 2018, 10:36:03 AM |
|
I think that this idea is rather a juicy investment at the moment! Good luck team.
|
|
|
|
Tom Welling
Newbie
Offline
Activity: 14
Merit: 0
|
|
June 22, 2018, 10:46:24 AM |
|
I think projects like this need a lot of attention because these sorts of projects are really important nowadays with that many hackers online. I think that this is why this ico will be popular in the future if they are active enough and have a decent amount of investors.
|
|
|
|
Allison Jane
Newbie
Offline
Activity: 32
Merit: 0
|
|
June 22, 2018, 12:21:29 PM |
|
If you are looking for best ICO, then you are looking for CloudFish. CloudFish is relatively a new ICO that was launched and promises alot, as they are best in providing security.
|
|
|
|
Abymic
Newbie
Offline
Activity: 26
Merit: 0
|
|
June 23, 2018, 09:19:34 AM |
|
Good night. Their idea is rather attractive in my mind! Able to recognize logo, seamless website!
|
|
|
|
Risen4610
Newbie
Offline
Activity: 44
Merit: 0
|
|
June 23, 2018, 10:40:21 AM |
|
Project looks interesting! (Y) I have a question. What makes this coin superior to Storj ?
Thanks for your compliments. Regarding your question, Storj and CloudFish, although the two companies share some common strengths, their products are completely different and targeting different market segments. Storj's product is in the cloud storage while CloudFish's product is in the cloud security space. CloudFish Enterprise Security Suite consists of three main functional components: The Cloud Access Security Broker (CASB) and the Cloud Data Encryption Interface (CDEI). Cloud Access Security Broker (CASB)The CloudFish CASB uses a proprietary algorithm to store and manage users’ encryption keys using block chain technology. Unlike the traditional CASB products available in the market that stores users’ private encryption keys on a single server, the CloudFish CASB splits the users’ keys into fragments and stores it in blockchain. This makes it virtually impossible for a hacker to steal users’ private keys and the digital assets protected through those keys. CloudFish uses a proprietary algorithm to dynamically construct and store users’ keys in the blockchain. The reconstruction and validation mechanism implemented by CloudFish for users’ encryption keys is very similar to the way blockchain validates your cryptocurrency transactions. The use of blockchain for security keys validation makes it not only impossible to steal but also makes it easy for the user to access it anytime from any platform……means you don’t have to worry what happens to my crypto wallet if my laptop is stolen or lost or if the wallet company’s server gets hacked. Cloud Data Encryption InterfaceThe Cloud data encryption interface provides a transparent security layer on top of commercially available cloud services. This layer automatically encrypts any data going to the public cloud and decrypts it when the data is received on the local machine. This encryption layer uses the industry-standard AES 256-bit encryption and it is built on top of the public interfaces provided by commercial cloud services provider. In release 1.0, CloudFish product has been integrated with Dropbox, Google Drive, Box and Microsoft OneDrive. In release 2.0, additional integrations are planned including Amazon Web Service (AWS) Salesforce.com, Slack and IBM Cloud. CLOUDFISH CLOUD SERVICES GATEWAY (CSG)CloudFish Cloud Services Gateway (CSG) is a separate licensable product which integrates with CloudFish Enterprise Security Server. The CSG provides enterprise data services related to security including automatic detection and control of security threats for the data, the companies store on commercial cloud servers. The CSG is an agent-based software. Each node in the enterprise network (laptop, desktop, server etc.) runs a CloudFish agent software that monitors the network use pattern on that machine. It uses the artificial intelligence technology and machine learning algorithms to detect unusual activities like suspicious login attempts, hacking or intrusion attempts, ransomware or a potential spyware or malware activity on each. Upon detection of a suspicious activity on a node, the CloudFish agent running on that node immediately takes preventive actions on that node and it triggers an ‘alarm’ about the security risks that propagates to other nodes in the network . Upon receiving this information, the agent software running on other nodes takes preventive actions to isolate themselves from the network threat. This sharing and learning about network threats among different network nodes acts like a ‘collective network wisdom’ which minimizes the risk of large-scale data loss and services interruption for the enterprise. I just read your explain about project. This great to protect our data from hacker with router. Hackers are very wise and as some will say they are actually one of the most intelligent and smart people on the planet... So the journey Cloudfish is embarking on is a tough one but i know they will surely come out strong...
|
|
|
|
|