Primary Services

  • Data Storage Security
  • Email Security
  • File Sharing Security
  • Consulting & Program Development

Secondary Services

  • Awareness Training
  • Compliance / Regulatory
  • Messaging & Call Security


  • SUMMARY: TecSec specializes in sophisticated encryption for any size data that goes above and beyond normal encryption standards.
    • Primary focus: Dynamic key management
    • Attribute based access enforced at the digital object level by cryptography. 50 Word Summary: Information security (INFOSEC) must extend from point of creation, through transmission, into storage and until destruction. The introduction of time into the model for secure access control follows the movement from COMSEC (Communications Security) to INFOSEC. The IA (Information Assurance) Objectives of INFOSEC, requires a process of data object rather than transmission or storage, and dynamic keys rather than static. 500 Word Description: Information, when viewed over time, belongs not to the individual but to the organization itself. Health records for example, must be kept, securely, for over 100+ years because we each may live that long. Differential access must be offered to the various individuals and processes that may need access to that data in the future without having to constantly touch the data over and over or be concerned about where the data might be stored or how it might be transmitted. The protection is at the data layer itself. This process creates self-protecting data objects that are data label aware and offers services based on that awareness. This process of data label awareness facilitates a smarter network of layered cryptography and enables the secure adjudication of the various objects, correcting for spillage, prioritizing, without compromising content The solution offered here enables; differential access to content, within a document (redaction) down to a period in sentence. Attribute based access is enforced by the use of multiple algorithms for compartmentation and hierarchical access to the objects via cryptography while reflecting the taxonomy of the information owner. At the same time the burden per object is a mere 500 bytes without knowing who might want to retrieve or access the information ahead of time, rather than the limitation of needing to know who, the process offers access by content descriptors; access by what. The resultant is protected data, indifferent to network topography; facilitating transmission as a matter of availability and storage a matter of convenience. This process provides the data protection required and at the same time, offers the differential access (tear line/slug line) necessary for such tasks as Air Tasking Orders, Multi-National Information Sharing, or The same digital security controls may be used across the entire enterprise under common security architecture; addressing physical access (door), logical access (network), functional access (.exe or .dll) as well as content (a word, a phrase, an image). This common architecture is further maintained by those who are familiar with the social fabric of the organization (guards for physical, network admin for logical, application owners for functionality and by those who realize the significance of classification or need to know for the content.

“Tecsec Information security extends from point of creation, through transmission, into storage and until destruction. The introduction of time into the model for secure access control follows the movement from COMSEC to INFOSEC. We at Tecsec, realize trying to do the same thing over and over and expecting different results is the definition of insanity, so we took an original path that protects not only your network, but more importantly your data indifferent to transmission or storage or network topography.”



Emergency or Crisis?

Government Contracting Codes

Devices Serviced

, , , , , ,

Compliance / Regulatory

, , , , ,