This train of thought really showed that ‘just because you have a good idea, getting people to embrace it is, and always has been the biggest challenge. Never-the –less, even in the face of such resistance, and assuming the role of the Number One Enemy of the Status Quo, Jay and his business partner Ed realized early on that we are all ubiquitously connected and this connectivity would create security risks. They formed TecSec to address the security problems they saw as imminent. That was 3 decades ago. However, at that time, the internet was still young, the general public did not believe it had a need for the solution proposed by TecSec.
Wack predicted that a time for extensive cybersecurity would arise in the future. Needless to say, in today’s hyperconnected world, the need for preventative measures within such an ecosystem is of paramount importance. “In my experience, I have noticed that people are becoming more aware of what the problem is and recognizing that they have to do something different to tackle them. This is where our company comes in,” comments Wack.
Quantum Resistant/Quantum Immune due to our use of Symmetric Keys. Protection against Quantum computing is available today via the TecSec CKM technology. The relative scalability achieved by this approach, together with encryption at the object level, provides enforced role based access and granularity not otherwise available.
National Standard for Financial Services X9.96 XML Cryptographic Message Syntax (XCMS) calls CKM out by name in the Accredited Standards Committee X9, Incorporated.
Financial Industry Standards: See the following sections
Section: 3.6 constructive key management CKM
A method of establishing a key, whereby several components of keying material, both symmetric and asymmetric type of keys, where each component is used for a specific purpose, are combined together using a mathematical function to produce an object key.
Section: 3.7 content encryption key CEK
The symmetric key used to encrypt the content of a message.
TecSec, founded in 1990, is a privately held small business located in Northern Virginia’s technology corridor. TecSec’s focus is on Information Security and Information Access Management, enforced through cryptography. TecSec provides consultation and design services, as well as software and hardware products based upon the company’s 7th generation, standards-based Constructive Key Management (CKM®) technology, leveraging our large library of patents and still growing intellectual property.
Through a 21st Century Key Management System, designed especially for the connected world and cloud environments of today’s businesses, TecSec’s VEIL® Suite of products bring privacy, confidentiality, and scalable management of content, independent of the means of transport or the type of information. VEIL® technology has the potential to enhance the full range of digital applications, including wireless platforms, Critical Infrastructure Protection (CIP) arenas, financial and legal environments, as well as healthcare privacy enforcement. VEIL® allows for CKM® Enabled solutions that can be employed as software, firmware, hardware, or in a combination, including the TecSec® Armored Card.
TecSec, working within the ANSI and NIST Standards, has developed a means to cryptographically protect financial transactions, whether in transit or at rest. Actively working with the banking community, TecSec’s VEIL® technologies have bound access privileges to the data cryptographically, formulated self-protecting data objects, and assured content security. Countermeasures have been deployed to deny attackers a means to intercept and obtain valuable information.
Attribute Based Access Control
TecSec provides multiple attribute based access solutions through an integrated encryption and key management system, solidly based on Standards.
Access, protect the privacy of information in documents, and dynamically tailor displays so that users see only what they are supposed to see.
We are all ubiquitously connected
1. Cyber security as defined by the Intelligence Community requires the move from the classic security model of Communications Security (point to point) to a more logical concept of Information Security which develops:
a. The creation of Self Protecting Data Objects
b. Fine-grained Objects that are data label aware
c. Services based on that awareness
d. Provide role based access to content over time
e. Dynamic key, constructed at time of need
2. This solution provides secure object level protection to information (at the level of a single word):
a. Virtually eliminates Wiki Leaks by addressing the insider threat to information access
b. Allows secure coalition force access to information
c. Supports secure information sharing among and between all communities of interest
d. Supports the PCAST report to the White House on security health care information protection
e. Helps resolve the issues associated with identity and distribution of entitlements to citizens
f. Supports the secure use of “cloud” architecture as defined by the White House OSTP, CIO and CTO
3. This solution is available today.
a. Developed by Tecsec, Inc, and called Constructive Key Management
b. Codified by the American National Standards Institute (ANSI)
c. Certified by NIST under FIPS 140-2 and FIPS 201
In addition to the software, TecSec provides hardware too
To further elucidate on the TecSec’s CKM capabilities, Wack shares a success story of a major utilities supplier who wanted to safeguard ten million lines of code after they were written and implemented. “By working with us at the object level, the client did not have to rewrite the code as feared by the developers,” he explains. Within six weeks of implementing VEIL, the utilities supplier witnessed a whole new level of streamlined IT security: from data encryption through to a holistic supply chain protection.
Considering the growing number of threats today, organizations that house personal information of millions are beginning to prioritize InfoSec with the utmost immediacy. TecSec aims to mitigate the challenges organizations face when trying to endorse new preventative measures and reinforce security with cutting-edge, quantum computing technology.
Who are these People? Glad you asked!
Ed Sheidt Founder & Chief Scientist: Former head of cryptography of the CIA retiring after 26 years of service. CIA Director William H. Webster referred to Scheidt as “The Deep Throat of Codes.” . Ed holds numerous patents for CKM (constructive key management)
Ed Scheidt is the Chair person for ANSI x9 Data and Information Security standards for the US financial services. He has been a speaker on cryptography at various events. He is also the Chair for The International Standards Organization (ISO) for digital expert. He is recognized as a world expert in these areas.
Jay Wack, President/CEO: With over 20 years’ experience as application engineer, specializing in microcontrollers and embedded microprocessors, representing Intel, National Semiconductor and has been involved in the successful customer design of Application Specific Integrated Circuits. Jay has been awarded over a dozen US patents in areas of cryptography and security product design. Along with his TecSec responsibilities he is on the Working Groups with the Federal Reserve on data security, identity, and access control. He is also a contributing member to SWIFT, and an active member on the ANSI group. Published in the American Bankers Magazine on security.