Ensure Access for Your Business
With secure and flexible reconstruction of your critical keys & credentials.
The $6 billion dollar outage
In July 2024, during the CrowdStrike incident, Microsoft recommended manually removing the defective file. Implementing this at scale was a major challenge for over half of Fortune 500 companies, which were losing revenue by the minute.
To recover quickly, many organizations required access to their storage master keys to unlock encrypted drives, but these keys were often stored in impacted Privileged Access Management (PAM) systems. With over 3,000 flight cancellations disrupting airports, several companies found their off-site escrowed master keys, often stored in another state, inaccessible.
In the wake of this widespread incident, leaders are reflecting on critical lessons, with many reevaluating cloud strategies and seeking ways to eliminate single points of failure. SecretShield would provide a more robust solution for large companies, enabling secure storage and retrieval of master keys without relying on active networks. By allowing credentials to be escrowed securely and accessed during network outages or crises, SecretShield could safeguard billions in lost revenue and streamline business continuity.
Address Business Continuity and Disaster Recovery
- Leverage battle-tested cryptographic techniques perfect for businesses that can’t afford delays or unauthorized access.
- Ensure continuity despite outages with a solution that operates independently of your network and critical systems.
Protect your assets and your clients
Trust is everything - lose it, lose your clients For banks, financial institutions, and independent financial professionals, protecting sensitive client data is essential to maintaining trust.
Beyond Traditional Finance
As financial institutions expand offerings beyond traditional finance, some products like crypto have increased complexity including the management and recovery of keys. SecretShield is the perfect solution for your staff while affording your institution backup/recovery of those keys without creating undue risk.
Payable on Death (POD) or Transfer on Death (TOD) Accounts
For financial advisors and planners, some products such as payable on death (POD) or transfer on death (TOD) accounts work well with traditional finance but when it comes to crypto and digital inheritance client friendly solutions were lacking. SecretSheild is the perfect solution, enabling your clients' to have POD/TOD capabilities with digital assets.
Versatility Across Every Business
Break Glass Accounts
Break Glass Accounts are your emergency keys to the digital kingdom. While storing them in a company vault or with a custodial provider is standard, it comes with downsides. Too many people may have access, or not enough. A single point of compromise could expose critical assets, and in a real emergency, physical access might not be possible. You need tighter control with off-site flexibility.
SecretShield ensures that only trusted individuals can access Break Glass Accounts when absolutely necessary—and only with mutual approval. Decentralized and out of reach until a crisis hits, your accounts stay secure but accessible when needed.
Flexibility to fit your needs
Resilient Recovery
Recovery can happen without needing everyone to participate, as long as the required threshold of participants is met.
Executive Approval
Assign more shares to executives or designated approvers, requiring their participation in the recovery process.
Offline Recovery
Data can be recovered without a network connection, as long as participants' devices are within Bluetooth range.
Tailored Configuration
You control which participants must approve or initiate recovery, allowing you to tailor the process to suit your business needs.
How businesses are using SecretShield
Access Break Glass Accounts
Challenge: A tech firm needed a way to store Break Glass Accounts securely for emergency access. Storing them in the company safe left too many people with access while excluding important team members without physical access.
Solution: SecretShield enables on-demand reconstruction in a time of need. Only with enough approvals from other team members can the designated personnel reconstruct credentials to the accounts. This allows for tighter control, ensuring credentials are only available when absolutely necessary.
Recover System Outages
Challenge: A major 3rd party security vendor put out a patch that caused all the systems to go down including the administrative servers and network authentication servers.
Solution: Secret Shield helped the team recover the file encryption keys allowing the staff to disable the faulty software and restore systems.
Safely Share Trade Secrets
Challenge: An executive team and board needed to provide the secret formula to a staff member as part of a new initiative. The board manages access to the formula, but does not have permission to view it.
Solution: SecretShield allows the board to approve recovery of the sensitive information without personally having access to it.
Security
No Single Point of Failure
Leveraging distributed share technology, your sensitive information remains secure even if some shares are lost or compromised. You maintain full control over who holds the shares necessary for data recovery.
End-to-End Encryption
Each message is encrypted with a unique key on-device, preventing any unauthorized access during transmission. SecretShield never has access to the encryption keys, and no decrypted data is stored on our servers.
Zero-Trust Architecture
Even if network communications are fully observed, your data remains secure. SecretShield uses x25519 EC + ChaCha20-Poly1305 encryption, combined with iOS and Android’s native security environments
Learn more about our business and enterprise offerings
Contact us at [email protected] for details!