Ubiq, the trailblazer in digital data security, has developed a multi-patented, ultra-low latency and low impact solution that secures any type of data, on any device, anywhere, delivering on the promise of a "fast and safe connected world." 

Ubiq's extremely lightweight, 100% software stack, can be directly integrated into existing applications, IoT devices or installed on laptops and servers to secure critical data. 

The solution leverages a proprietary data-centric security methodology that renders stolen data useless, when (not if!) it's stolen by the bad guys or unknowingly compromised. 

Ubiq works across public and private sector organizations to ensure all their data is secured in a transparent manner while eliminating the vast amount of management complexity of traditional data security solutions (encryption has been hard!). 

For more information, visit www.ubiqsecurity.com 

Ubiq Trusted File Manager (TFM)

Trusted File Manager moves the traditional security perimeter from the network to the data itself and protects sensitive data anywhere. It provides a transparent user experience to create and secure data files of any type at inception. Data is automatically fragmented and encrypted using the Ubiq encryption scheme and stored in an assigned repository. 

Administrators manage which repositories users can store data to and users simply drag and drop their data in folders via their local machine. TFM also gives administrators the ability to enforce data governance policies and least privilege access to ensure that users only have access to the data they need to do their job. TFM is completely software-based and consists of a very lightweight client software application and GUI for management and administration.

Ubiq Data Security Software Development Kit (SDK)

Ubiq has developed a patented, 100% data security software solution to support the data growth fueled by cutting-edge technologies such as virtualization, video analytics, IoT, edge computing, AI, machine learning and big data analytics. This asynchronous multithreading technique allows us to exploit available compute on a system, without impacting system performance. We leverage this technique in our data security model, which involves a 4-step-process to secure any data type. Each fragment is encrypted with its own unique encryption key (AES 256 out-of-box) and can be stored separately from the other fragments. If an encrypted fragment is intercepted in-transit or accessed at-rest, it is nearly impossible to make any use of it. 

With Ubiq SDK, you can engineer solutions that: a) Encrypt data and store it anywhere the device can access - local disk or cloud storage b) Retrieve and decrypt Ubiq protected data c) Stream data securely from A to B in real-time (including live video) d) Create a secure remote access function e) Restrict access to Ubiq protected data f) Securely encrypt and decrypt files within a local or remote filesystem. 

Ubiq Contracts

Contract Name sort descending Contract Number Sector State
CIO-CS HHSN316201500012W
  • Federal
SEWP V Group A: NNG15SC07B; Group D: NNG15SC98B
  • Federal