• Welcome to MyPrivacy SafeSpace.

    THE TRUSTED PLACE

    TO STORE AND SHARE

    YOUR SENSITIVE DATA.

    Learn how you can solve your privacy challenges efficiently.

    Schedule Free Call

WE BUILD DATA PRIVACY SOLUTIONS
FOR EVOLVING BUSINESS NEEDS

We are an innovative solution provider, helping our clients to solve their privacy and compliance challenges efficiently.


At MyPrivacy we share passion for data security, cryptoraphy and innovation. We know how delicate the handling of sensitive data is, but also how inadequate and deficient existing solutions on the market are.


For this reason, it was and is our goal to provide a reliable solution for data security. We have made it our business to protect both the personal sensitive data and the machine data of our customers without compromise.


The so-called SafeSpace was specifically designed for this purpose.

SafeSpace redefines state-of-the-art IT-security, based on patented cryptographic technology and mathematical proofs.

It protects data and files of any size, stored on-premise and in public, private or hybrid clouds.

Its modular system architecture enables seamless integration with our clients existing systems to enforce security policies and fulfill compliance requirements.

SafeSpace -

THE SMART WAY TO PROTECT

YOUR COMPANIES

MOST VALUABLE ASSET

Learn about cutting edge privacy solutions.

Schedule Free Call

RETHINK SECURITY

What differentiates MyPrivacy from other security solutions on the market is the unique combination of advanced security mechanisms merged in one groundbreaking technology solution. Additionally we serve our customers with smart services to mentor them on every step of the way. Our flexible pricing model ensures, you only pay for what you need.

GROUNDBREAKING TECHNOLOGY

  • patented metadata obfuscation
  • blockchain notarization
  • h2h / h2m / m2h / m2m
  • countless use cases, various industries
  • multi-cloud approach (bring your own cloud)
  • data sovereignity
  • automation & integration
  • forensic audit trail
  • digital multi-party escrow
  • decentralised permissioning
  • unforgeable timestamps

SMART SERVICE

  • we are solution architects, business analysts, project managers and system integrators
  • digital transformation
  • cross industry experience
  • best practice approach
  • legal & compliance know how
  • international reach

FLEXIBLE PRICING

  • user based (continuous...)
  • transaction based (continuous...)
  • project based (first time implementation)
  • feature based (adding more features affects the price)


Security without compromize



Search & Filter encrypted files



Automation & Integration



1000 times more file capacity



Highly customizable



Made in Austria


COMPREHENSIVE FEATURES TO ENHANCE YOUR PRIVACY

Multi-factor authentication

Authentication of users is based on a combination of: who they are, what they have, and what they know – such as their username, password and the TAN sent to the user's mobile number.

Forensic audit-trail

Every user action is logged and the log files are chained together, sealed using the user's signature and locked with an administrator key. Additional notarization in a public blockchain protects even against collusion of users and system administrators.

Retention policies

Data persisted in the storage is deleted by an automated job as soon as their individually configured retention period is over. Before final deletion, data can be downloaded or moved to another storage.

Signing, watermarking, steganography

Tracking of documents exported from the system based on information added to or concealed within them. The tracking information can be made visible or even undetectable. It is used for identifying each individual copy of the document exported by the users.

Multi-layer access control

Three levels of access control are combined to ensure that only authorized users have access to the storage, can locate data within the storage and retrieve or overwrite it depending on their permissions.

Identity federation

Beside creating native identities for registered users, standard protocols for integrating enterprise directories and social identity providers are also available to authenticate users based on their existing credentials.

Blockchain-based notarization

An unforgeable timestamp of the upload or the last modification of specific content in the storage is represented by an immutable record in a public blockchain, which proves that the content has not been altered afterwards.

Confidential messaging

Messages exchanged between users regarding e.g. sharing content can not be distinguished from other data persisted in the storage. Thus, only the data owner knows with whom the data was shared.

Secure ad-hoc sharing

Unregistered users can access shared files by using a temporary link with optional password protection generated by the file's owner and provided to the unregistered users.

Multiparty key escrow

Based on defined rules, access keys can be split into shares and distributed among a group of people, who can collaboratively reconstruct them in case of emergency.

Browser-based access

Files and folders can be uploaded, shared and accessed in the storage directly from the browser on any computer or smartphone.

Zero knowledge proofs

Permissions to access shared content are verified based on non-interactive zero knowledge proofs, which do not disclose any information about the identity of the user requesting access.

Multi cloud support

Based on data sovereignty requirements applying to their use case, customers can choose their preferred cloud provider and region.

On-premise storage support

Beside public and private clouds, customers can also protect their data persisted in on-premise storage solutions.

Processing directives and automation

Processing directives enable the automation of human tasks like downloading and deleting transferred documents and the enforcement of security policies such as applying upload fiters or steganography on the users' client.

Non-hierarchical data (coming in V2)

Beside files and folder hierarchies, the obfuscation and anonymization techniques will be adopted to other data structures and exchange protocols like MQTT.

Upload filters (coming in V2)

Data is filtered for malicious code and illegal content before it gets encrypted and uploaded to the storage.

Desktop integration (coming in V2)

Uploading, sharing and accessing files and folders in the storage will be integrated into the file explorer of common operating systems.

Embedded system integration (coming in V2)

The core cryptography library is written in C/C++ to enable integration into embedded system environments.

Trusted computing (coming in V2)

Remote attestations ensure that only genuine clients can connect to a gateway and prevent fake clients which could circumvent processing directives from accessing data persisted in the storage.

COUNTLESS USE CASES IN VARIOUS INDUSTRIES

Banking &
Financial Systems

Healthcare &
Medical Systems

Digital Escrow &
Last (Living) Will

Industry & Manufacturing

Insurance

Mobility

Defence, Government,
Law Enforcement

Critical Infrastructure

Learn how you can solve your privacy challenges efficiently.

Schedule Free Call

Contact Information:




Project Office

Argentinierstraße 53/16

1040 Vienna

Austria

Phone

+43 677 61222575