TecSec’s VEIL® Technology
VEIL® Technology is TecSec’s standards-based and patented key management encryption system that forms the foundation of TecSec’s product line. VEIL® is a cryptographic key management framework that answers the urgent need for information security, access management and complete recoverability of digital assets. In today’s vastly networked world with digitalized applications such as Voice Over IP (VOIP), Critical Infrastructure Protection (CIP), and Virtual Private Networks (VPN), the need has never been greater to identify authorized users, protect and control sensitive information assets, and manage access to information, in compliance with privacy statutes and regulations.
VEIL® technology, utilizing the constructive key management standard, protects information down to the object level. It can secure any object from a field in a healthcare claim form—to a selected portion of a Microsoft® Word Document—to an entire file of real-time, streaming digital media. VEIL® is at the core of an advanced Role Based Access Control (RBAC) system that allows secured information to be shared among groups of users, each group having different levels of access to the secured information. VEIL® encrypts at the information level and manages information sharing relationships via cryptography. It is well understood that network perimeter defenses (firewalls, anti-virus, etc.) must be supplemented with the protection of the network content and TecSec’s VEIL® products and solutions provide the protection of the content to effectively supplement network defenses.
VEIL® technology, utilizing the constructive key management standard, protects information down to the object level. It can secure any object from a field in a healthcare claim form—to a selected portion of a Microsoft® Word Document—to an entire file of real-time, streaming digital media. VEIL® is at the core of an advanced Role Based Access Control (RBAC) system that allows secured information to be shared among groups of users, each group having different levels of access to the secured information. VEIL® encrypts at the information level and manages information sharing relationships via cryptography. It is well understood that network perimeter defenses (firewalls, anti-virus, etc.) must be supplemented with the protection of the network content and TecSec’s VEIL® products and solutions provide the protection of the content to effectively supplement network defenses.
VEIL® Cloud
Providing Information Security in the Cloud is now possible with TecSec’s VEIL®, employing standards-based CKM technology. Access control over any digital object is established and enforced utilizing a secure, portable, federated token, combined with CKM Encryption of the object through the Cloud.For more information on VEIL Cloud
See our product brochure.VEIL® Mobile
TecSec’s VEIL® technology can be utilized to provide secure mobile computing on numerous mobile platforms – allowing secure communications, as well as secure banking and business transactions from your mobile devices. TecSec has partnered with State Agencies to provide mobile resources for emergency personnel, medical records, DMV records, as well as Dept of Natural Resources and Recreation Departments.For more information on VEIL Mobile
See our product brochure.VEIL® Enterprise Builder
VEIL® Enterprise Builder (EB) is an information access management tool designed for large organizations and powered by TecSec’s patented and standards-based VEIL® technology. EB allows you to design and implement a secure architecture for Cryptographically Enforced Access Management (CEAM™) and information sharing within your Enterprise. This methodology gives logical groupings of Members the proper levels of access to information within your organization.For more information on VEIL Enterprise Builder
See our Product Brochure.Control Systems - IOT
Connecting people through mobile computing and communication platforms, connecting roadside services through wireless infrastructures, and critically importantly, connecting Critical Infrastructure securing power grids and improving our ability to monitor and actively utilize airspace, TecSec is providing solutions through VEIL® technologies and ABAC.For more information on Control Systems
See our Product Brochure.Financial Solutions
TecSec has developed a means to cryptographically protect financial transactions, whether in transit or at rest. TecSec’s VEIL® technologies have bound access privileges to the data cryptographically, formulated self-protecting data objects, and assured content security. Countermeasures deny attackers a means to intercept and obtain valuable information.For more information on Financial Systems
See our Product Brochure.OpenVEIL® and KeyVEIL®
OpenVEIL® is an open-source system offering a connector that allows for isolation of applications from the key management and bulk data encryption services.KeyVEIL® is the Member facing component of TecSec’s Key Management System for generating/regenerating the keys for data encryption.
For more information on OpenVEIL® or KeyVEIL®
See our Open VEIL® Product Brochure and our Key VEIL® Product Brochure.TecSec’s Other Products and Services
TecSec provides many products and services based upon its VEIL® platform. These include: Information Assurance products for networks, mobile devices, physical access, and desktop; Dynamic, Assured Information Sharing & Access Management; Cryptographically Enforced Attribute Based Access Control (ABAC); as well as support and services related to its information assurance products.
CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography.
CKM Enabled
OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly. It is designed to run on multiple operating systems.
The following applications are CKM Enabled®:
- VEIL® Enterprise Builder
- OpenVEIL®
- KeyVEIL®
- FileVEIL®
- VEIL® Token Manager
- VEIL® Smart Card
TecSec’s VEIL® suite of products is able to provide persistent enforcement through tagging of objects for specific audiences or with specific attributes by deploying standards-based Constructive Key Management® (CKM®) providing protection of the data itself as a persistent object, at rest or in transit, regardless of where the object is stored within your network topography. Through this process, information is shared easily within an organization, ensuring that only those recipients with the proper attributes and permissions will be able to access the information.
View a graphic representation of this technology.
States have recognized that the capability now exists to provide their citizens with an unprecedented level of security, privacy, service and benefits on a smart card, at significantly reduced costs. In order to provide these services and benefits in the most efficient manner, States have decided to issue a Citizen’s Benefit Card (CBC) to each person in the State, at no charge to the individual.
More information about the Citizen’s Benefit Card is available in the Library.
The cars of tomorrow—which are already appearing today—will be increasingly connected—to the Internet, to each other, and to roadside wireless infrastructure using the CKM attribute based access control process which can enforce data context usage, providing the mechanism to make decisions about data based on the type of data, the collection method, and the owner of the data.
More information about The Connected Car is available in the Library.
Every business acquires, uses, and stores personally identifiable information (PII) about its employees, customers, and business partners. Organizations can manage this private data appropriately and take every precaution to protect it from unauthorized access or theft by using an integrated encryption and key management solution from TecSec, solidly based on Standards.
More information about Protecting Corporate Personally Identifiable Information is available in the Library.