How does it work?
UMBRA uses a distributed network of computing devices called “Guardians” to protect user-data. Customers that deploy our technology can communicate with the Guardian Network to offer strong encryption services for end-users. Keys that are generated with help of the Guardian Network never exist once the user signs out, hence, cannot be stolen or get lost!
4 simple steps
Frequently asked questions
Here are some answers to common questions:
UMBRA aims to become the protector of sensitive data.
As data breaches will continue or even rise within the next 10 years, UMBRA has a unique opportunity to catch the wave and become the data security world's leading data breach protection service provider.
While other protection mechanisms try their best to protect systems "from the outside" with firewalls, intrusion detection and malware detection, UMBRA protects your business where it actually matters: on a data level.
In contrast to traditional encryption, our technology decrypts data on the fly when the user is logged in and stays encrypted while the user is logged out. No custodial decryption key is stored on server side!
This means that neither UMBRA, nor the server can read your data. Users fully control their own data!
We derive a user-specific key based on the login credentials of a user joint with a distributed Guardian Network. We then use that key to encrypt data with that key. The distributed multiparted key derivation algorithm makes sure that even in case of a data breach the data cannot be decrypted without the specific username and password and cannot be broken by a bruteforce attack.
To derive a key, one or multiple guardians services have to be contacted, these are necessary to recompute the key, but have no knowledge of the data encrypted or the key used. These guardians make sure that every access to the data can be logged and make brute force attacks impossible. This is because for every decryption attempt the guardian(s) have to be contacted and can so detect and block excessive attempts easily.
Not that much. The derived key can be used with almost every major encryption algorithm, e.g., AES 256. The only difference beeing, that the key will not exist on premise without user interaction (login).
Absolutely not! The Guardians use zero-knowledge cryptography for password authentication and never learn any sensitive information.
Read our whitepaper to learn more.
Who we are
Meet our small team consisting of former and current scientists from FAU university! We are passionate about bringing state-of-the-art research and science into everyday practice with UMBRA.
Operations & Vision
“The future of every business, asset and commodity will be digital. Join us in our mission to protect sensitive digital information with UMBRA.”
Lead Technology & Product Development
“Personally, I always loved working with the latest-and-greatest technologies. At UMBRA, we deliver high-tech crypto in an easy-to-use solution.”
Dr. Carlos Rabes
“Data breaches are the modern day equivalent of burglars entering your home and stealing your most valuable possessions. Let us at UMBRA protect your digital home, easy and simple!”
Prof. Dr. Dominique Schröder
Technology Inventor & Academic Relations
“My research is primarily concerned with the development of cryptographic techniques for protecting security and privacy. UMBRA is my first effort to bring these techniques into real-world practice!"