Any Digital Asset, Secured, Anywhere

A multi-layered security ecosystem providing defense in depth

Find out more

Any Digital Asset.

When you hear ‘digital asset’ most people think of cryptocurrencies – something with obvious value. At Lokblok, we think that every piece of data in your organization from a simple Word document through to the data on your blockchain are your digital assets. We protect those assets.

Secured.

The internet was never designed to be secure, yet we spend most of our working day using it. Anti-virus, firewalls & VPNs are better than no protection, but given the number of data breaches that regularly happen, they’re not good enough. We use multiple layers of military grade technology to secure your data.

Anywhere.

Data exists in three states, at rest (on your hard drive), in use (by an application) and in motion (over the internet). Whether you’re remote working, a computer outside the corporate firewall or a blockchain endpoint, we can protect your data in whatever state it is and wherever it resides.

Secured.

The internet was never designed to be secure, yet we spend most of our working day using it. Anti-virus, firewalls & VPNs are better than no protection, but given the number of data breaches that regularly happen, they’re not good enough. We use multiple layers of military grade technology to secure your data.

Any Digital Asset.

When you hear ‘digital asset’ most people think of cryptocurrencies – something with obvious value. At Lokblok, we think that every piece of data in your organization from a simple Word document through to the data on your blockchain are your digital assets. We protect those assets.

Anywhere.

Data exists in three states, at rest (on your hard drive), in use (by an application) and in motion (over the internet). Whether you’re remote working, a computer outside the corporate firewall or a blockchain endpoint, we can protect your data in whatever state it is and wherever it resides.

HOW DOES LOKBLOK WORK?

Using multiple layers of protection to give defense in depth, Lokblok developed Toughlok to protect data at rest and data in motion today. Future developments will secure the final data in use layer to provide a complete zero trust environment.

Lokblok has defined two pillars of security. At the core of Lokblok offering is pillar 1, a hardware root of trust (HRT). Unlike typical systems where there’s one HRT for the entire company, with Lokblok every user has their own unique HRT. This is where all the private keys and certificates are generated and stored, and unlike software generated keys, the hardware keys are NEVER exposed to the operating system or applications. They ALWAYS remain hidden in the secure tamper proof element. The hardware root of trust can also be used to encrypt your data at rest and data in use.

Also in Pillar 1 we have developed Toughlok Zero Trust Desktop (ZTD) that protects your applications, networks, and data. The end user can’t read of save data until the USB key is used to authenticate to the Lokblok encrypted vault. All interfaces are disabled. You use the Lokblok browser and authorized applications only and all other browsers and applications are disabled.

In Pillar 2, Lokblok has a Split Knowledge Service that guarantees you are working on the web server you think you are securing communications between your laptop and the application server. Hijacked browsers will NEVER authenticate the USB key at the application endpoint.

Also in Pillar 2 we add an additional defense in depth security layer to secure communications for all applications. The ZTN application is safeguarded in the Lokblok encrypted vault and only accessed after authentication using the USB key. All applications are dark on the internet until the USB key is used to authentication the ZTN client on the laptop and the gateway in the backend.

The Lokblok Security Ecosystem

HOW DOES LOKBLOK WORK?

Using multiple layers of protection to give defense in depth, Lokblok developed Toughlok to protect data at rest and data in motion today. Future developments will secure the final data in use layer to provide a complete zero trust environment.

Lokblok has defined two pillars of security. At the core of Lokblok offering is pillar 1, a hardware root of trust (HRT). Unlike typical systems where there’s one HRT for the entire company, with Lokblok every user has their own unique HRT. This is where all the private keys and certificates are generated and stored, and unlike software generated keys, the hardware keys are NEVER exposed to the operating system or applications. They ALWAYS remain hidden in the secure tamper proof element. The hardware root of trust can also be used to encrypt your data at rest and data in use.

Also in Pillar 1 we have developed Toughlok Zero Trust Desktop (ZTD) that protects your applications, networks, and data. The end user can’t read of save data until the USB key is used to authenticate to the Lokblok encrypted vault. All interfaces are disabled. You use the Lokblok browser and authorized applications only and all other browsers and applications are disabled.

In Pillar 2, Lokblok has a Split Knowledge Service that guarantees you are working on the web server you think you are securing communications between your laptop and the application server. Hijacked browsers will NEVER authenticate the USB key at the application endpoint.

Also in Pillar 2 we add an additional defense in depth security layer to secure communications for all applications. The ZTN application is safeguarded in the Lokblok encrypted vault and only accessed after authentication using the USB key. All applications are dark on the internet until the USB key is used to authentication the ZTN client on the laptop and the gateway in the backend.

HOW DOES LOKBLOK WORK?

Using multiple layers of protection to give defense in depth, Lokblok protects data in all of its three states, at rest, in use and in motion.

At the core of Lokblok is a hardware root of trust (HRT). Unlike typical systems where there’s one HRT for the entire company, with Lokblok every user has their own unique HRT. This is where all the private keys and certificates are generated and stored, and unlike software generated keys, the hardware keys are NEVER exposed to the operating system or applications. They ALWAYS remain hidden in the secure tamper proof element.

DATA AT REST

Using the HRT your Lokblok encrypts data on your hard drive to a level that’s impossible using software encryption.

For data that’s stored on a shared server or in the cloud, the Lokblok Digital Rights Management system enables you to encrypt files with your colleagues’ Lokblok keys so only they can decrypt and access that data.

DATA IN USE

Remember that smell you get when you drive a brand-new car for the first time? Factory fresh, no dents, no dings, no mileage on the clock.

Well, that’s what you get with Lokblok every time you boot up. OK, it doesn’t have that same nice smell, but you do get a factory fresh version of your operating system and applications – no malware, no viruses, just a fresh sterile computing environment every time.

There’s no need to worry that you’ve accidently picked up a new undetected virus, you can rest easy knowing that Lokblok secures your data in use.

DATA IN MOTION

If you think of a VPN as a 2-way tunnel between computers, that any application (or malware) can transmit data, if one end is compromised, the chances are that the rest of your network could become compromised too.

To protect data in motion at Lokblok, we use something called Zero Trust Networking (ZTN), the networking equivalent of a teleporter. It’s only open for the application that requested it, and it’s only open for the session that needs it. When it’s not in use, both ends of the connection are dark to the internet.

When data needs to be shared between locations, Lokblok secures your data in motion.

Get in touch to find out more about how Lokblok can secure your digital assets.

Get in touch