What's the point of having data if you can't share it? If I want to share it, it shouldn't make it less secure? With Aegis products you can share your data with any registered user with the certainty that the things you share can only be seen by you and the people you share it with.Learn More
Our technology is patented and has been used by the U.S. Military and U.S Government for years. Our apps are FIPS 140-2 validated. All Aegis products use this patented technology to secure your data wherever its it being used or stored.Learn More
Aegis uses a single user credential to encrypt and secure all of your data. By using this system all your data is secure, but completely accessible to you on all your devices and machines. Aegis products are also integrated with biometric systems for ease of use.Learn More
Aegis is a cybersecurity company that provides patented privacy and data security technology based on the US Government’s Certified Anonymous Key Technology (AKT). Confidential and private information is stolen every day. AKT provides your company with trusted security solutions that cannot be duplicated in the world of cybersecurity. AKT is simple and intuitive, providing users with confidence that all information, communications and data are protected at a military grade level.
Our mission is to protect and safeguard the lifeblood of any business – Information, Communications and Data.
AKT is a plug and play solution that keeps your information safe from hackers.
Aegis has been protecting data and communications in the U.S. Government for over 15 years and is now bringing this technology to the consumer, small business and enterprise level customers.
Anonymous Key Technology can be described as the evolutionary combination of traditional security technologies. Security experts like to see traditional technologies that are well understood and accepted. AKT uses traditional cryptographic algorithms like AES, the secure hash standard and traditional key management like Key Encrypting Keys and Data Encrypting Keys. AKT’s unique methodology provides a simple authentication system that delivers secure data transmissions based on the results of the authentication.
Generally, sharing of data is done through SSL or the use of private digital certificates but these two methods are fraught with danger. Aegis on the other hand, uses a new methodology which guarantees that the information is both shared and secured. The methodology is based on trust established between two entities. If Alice trusts Bob, then Alice can share something with Bob and if Bob can prove that he is Bob, then he can get access to the document. In sharing, the files are not re-encrypted when the recipient gets the file. In fact, the file is not decrypted until the recipient actually opens the file. Because of the fact the files are not decrypted at intermediate points, there is no ability for a hacker to compromise the files during the transfer process.
AKT utilizes AES-256 (Advanced Encryption Standard) a symmetric encryption algorithms that has been widely employed, tested, and proven in the marketplace. By combining unique communication processes and Anonymous Keys, AKT protects the privacy and integrity of confidential data at all points in the communications process including the data residing with the user’s computer, on the server, and at all points while in transit.
Patent Number 6,941,454
Aegis uses a technique for authentication that does NOT require the password or the username to be sent to the server. Because of this methodology, the username and password are not compromised if the server is hacked, which, is almost certain going forward. Therefore, you can choose one username and password and this combination will work seamlessly for all Aegis products. You do not need to choose overly complex passwords and you do not need to change them because you are the only one who has access to the password as it is never stored anywhere.
Since 2007, Aegis has been leveraging Anonymous Key Technology (AKT) to build some of the most sophisticated and secure products available to date. We have products that range from Secure Cloud Services to encrypted Teleheath and everything in between! If you have an application or a need for secure and authenticated access to data, Aegis has a solution for you.