Search indices store enough information about your data for a hacker to reconstruct highly confidential documents, including Personally Identifiable Information (PII) and Protected Health Information (PHI), which are subject to regulatory mandates. In addition, because search indices are stored in plaintext, hosting enterprise search platforms in the cloud exposes companies to even larger risks.

Key Benefits

How it Works

SearchStax's seamless and turnkey integration with Credeon enables highly secure cloud-based Solr application.

To prevent the risk of a data breach from search indices, Hitachi’s patented searchable encryption technology allows the search process to be carried out directly on encrypted data. Specifically, Credeon:

Key Benefits

SearchStax's seamless and turnkey integration with Credeon enables highly secure cloud-based Solr application.

Data security at rest:
Solr indices residing on
disks are encrypted.

Protection against unauthorized access: Prevent rogue employees or third party vendor personnel to gain access to sensitive data.

Risk Reduction

Addresses Compliance / Regulatory Requirements

How it Works

To prevent the risk of a data breach from search indices, Hitachi’s patented searchable encryption technology allows the search process to be carried out directly on encrypted data. Specifically, Credeon:

Encrypts the search indices

Uses a unique randomization process for encrypting each plaintext index

Searches through encrypted indices in real time

Returns search results without decrypting the indices

System Architecture and Product Components

Credeon Secure Full-text Search functions as a plugin module for SearchStax Solr-as-a-Service. The systems architecture and product components are shown in the diagram below

Technology Highlights

Credeon uses an AES 256 cryptographic module (FIPS 140-2 certified) and a probabilistic encryption scheme using 128-bit randomization process. This process makes the encrypted data resistant to advanced statistical attacks and virtually eliminates the risk of the plaintext being derived from the ciphertext.

The combination of homomorphic functions and a symmetric-key encryption scheme achieves a real-time encrypted search with an average of just 15 percent + overhead compared to a regular search

Encryption keys are managed independent of SearchStax by Measured Search to ensure only the customer have access to the data.

Contact us for More Information

We've got your back 24x7x365. Our helpful and always ready experts are a click or call away.

Want more info?
Send us an email with your needs