Key Shadowing is a patented secret sharing technology that permits a master key to be created, used to protect data in flight or at rest,“shadowed” into any number of parts, and then destroyed. The master key is never persistently stored. When the data needs to be accessed, a pre-defined number of the shadows (current options are 2, 3, or 4) must be used to regenerate the master key.

 
 
image 1.png

Master keys are destroyed

keystorage.png

Master keys are never stored

trust2.png

Circle of trust created

api.png

Agnostic to underlying key framework

imune.png

Immune to quantum computing