Ubiq was founded on the belief that data should be private, secure, and efficiently accessible throughout its life cycle, empowering organizations to derive maximum value from their data, while radically mitigating the risk of its theft and compromise.

Ubiq enables customers to achieve this through their entirely transparent and multi-patented data-first driven security and privacy platform, that secures data everywhere and enables only authorized system and user access. The lightweight software stack easily integrates into existing applications, IoT devices, or installs onto endpoints and servers - on-premise, on the edge, or in the cloud.

Ubiq has been awarded San Diego Venture Group’s Cool Companies of 2019 and Enterprise Security Magazine’s Top 10 Encryption Vendors of 2019 and has presence across North America, Asia Pacific, and Japan.

For more information, visit www.ubiqsecurity.com or follow Ubiq on LinkedIn.

Ubiq Trusted File Manager (TFM)

Trusted File Manager moves the traditional security perimeter from the network to the data itself and protects sensitive data anywhere. It provides a transparent user experience to create and secure data files of any type at inception. Data is automatically fragmented and encrypted using the Ubiq encryption scheme and stored in an assigned repository. 

Administrators manage which repositories users can store data to and users simply drag and drop their data in folders via their local machine. TFM also gives administrators the ability to enforce data governance policies and least privilege access to ensure that users only have access to the data they need to do their job. TFM is completely software-based and consists of a very lightweight client software application and GUI for management and administration.

Ubiq Data Security Software Development Kit (SDK)

Ubiq has developed a patented, 100% data security software solution to support the data growth fueled by cutting-edge technologies such as virtualization, video analytics, IoT, edge computing, AI, machine learning and big data analytics. This asynchronous multithreading technique allows us to exploit available compute on a system, without impacting system performance. We leverage this technique in our data security model, which involves a 4-step-process to secure any data type. Each fragment is encrypted with its own unique encryption key (AES 256 out-of-box) and can be stored separately from the other fragments. If an encrypted fragment is intercepted in-transit or accessed at-rest, it is nearly impossible to make any use of it. 

With Ubiq SDK, you can engineer solutions that: a) Encrypt data and store it anywhere the device can access - local disk or cloud storage b) Retrieve and decrypt Ubiq protected data c) Stream data securely from A to B in real-time (including live video) d) Create a secure remote access function e) Restrict access to Ubiq protected data f) Securely encrypt and decrypt files within a local or remote filesystem. 

Contract Name Contract Number Sector State
CIO-CS HHSN316201500012W Federal
SEWP V Group A: NNG15SC07B; Group D: NNG15SC98B Federal