Cybersecurity

CHIFs are built with powerful cybersecurity features.

Piece-By-Piece Encryption

With our encoder, data administrators can encrypt each piece of data separately – each with its own set of encryption keys and our clients can create different levels of data access for different needs or roles.

CHIF uses AES encryption algorithm with 256-bit key size, where AES is a symmetric key encryption standard, using either 128-bit or 256-bit keys.

Unique Identifiers and Remote-Controls

When a CHIF is made, a Universal Unique Identifier is created for each file, and each file can be monitored from a central location. This helps administrators control their file’s destination and access.

Administrators can even revoke access to a data container with an integrated “kill switch.”

Immutable or Non-Fungible Data

Once a file is created, it cannot be altered in any way. So, there is no way to pull a CHIF off of a system or network, add malware and add it back to the network.

If changes and updates are made to a CHIF in the encoder, a new CHIF will be generated with a new UUID, and the old one can be flagged and archived.

Meta Data and Analytics

Each file contains its own expose-able meta data, which can be used in conjunction with its UUID to track each file in the embedded system.

More robust and useful than a simple header file, this feature can help you control, secure and manage your data.

The C-Hear Technologies CHIF File is the perfect file type on which to base a Zero Trust Architecture/Model.

Once upon a time everyone just built a moat around their castle.
But what happens when the enemy gets across the moat and into the castle?
In a zero-trust world, we assume the moat and walls have been breached, so valuables are already locked up tight (CHIF), and everyone in the castle is already wearing armor (CHIF).


What is the Zero Trust Model?

The zero trust model is a new security architecture that focuses on preventing attacks by assuming that every user, device, and application is not trusted.

Traditional security solutions enabled each user on the network to have individual access rights. However, a zero-trust model requires a central security policy and policy enforcement points, such as an endpoint security solution, to ensure that data can only be accessed by those who have the right to it.

This more effective model fundamentally changes how organizations think about and execute their information security efforts. Zero-trust security also shifts security monitoring to the endpoint. To address these shifts and protect against data breaches and other cybersecurity threats, endpoint security solutions are a must, and we make a good one.


Why is the CHIF a Zero Trust file format?

Zero-trust networks focus on three areas:

  • Define and enforce network access control policies for external users and devices
  • Monitor network activity for security incidents
  • Automate the response to security threats.
CHIFs have unique identifiers, and each item of data in the file can be encrypted with its own key. System administrators can also deny access to any file they wish.

These file features and more render the old perimeter-based access model (that most companies use) obsolete.