TeskaLabs · TurboCat.io

GDPR compliant

GDPR recommends using encryption method to protect sensitive information.

read more

Protect sensitive data

Protect your business by encrypting any sensitive information.

Easy to use

TurboCat.io is modern and easy-to-use for non-technical people.

Battle tested

TurboCat.io is used by national mobile carriers to de-identify extremely sensitive and personally identifiable information.
The tool has been thoroughly reviewed and approved by a corporate security and data privacy officers.

O2
Czech Republic a.s.
Techstars
Cisco - TeskaLabs's Mobile App Security Technology
Microsoft UK BizSpark Plus Program
Tomas Budnik
CEO & Chairman of the Board, O2 Czech Republic
We use TeskaLabs’ technology
in O2 Czech Republic in several key areas.
Vlad Toma
IT manager, Prodvinalco
TurboCat.io is safe and easy to use. For us, it's important that the tool is simple because it is used by non-technical people. I'm very satisfied with the product.
Marek Beniak
CTO, Heureka
Even though they work for big companies we were able to establish personal cooperation without hassle. TeskaLabs guides us through secure and scalable mobile app development.

How it works

1. Connect local file system or cloud file system

2. Select file or folder with sensitive information

3. Press Encrypt to encrypt the files or folder

4. Press Decrypt to decrypt the files or folder

TurboCat.io is safe and easy to use. For us it's important that the tool is simple, because it is used by non-technical people. I'm very satisfied with the product. – Vlad Toma, IT manager, Prodvinalco

Pricing


BASIC
3 990 €
one-off licence
+
990 €/Year
maintenance fee
PRO
7 990 € 5 990 €
one-off licence
+
1 390 €/Year
maintenance fee


ENTERPRISE
On-demand

Contact us

Leave your contact information and a sales representative will contact you shortly.

Or, call us directly at +44 (0) 7548 674986

Features

File format

PDF, CSV, Microsoft Office (XLS, PPT, DOC, DOCX, DOCM), Libreoffice, Google docs, txt, zip, jar, PNG, gif, DB, AI, SVG, HTML, mp3, mp4, MPEG etc.

File system connectors

Local file systems (Linux, Windows, Mac)
Cloud file storages (e.g. Google Drive, Dropbox)
Private cloud file systems

Deployment options

On-premise
Public cloud (AWS, Azure, Google Cloud, …)
Private cloud

Cryprographic hardware

HSM compatibility
TPM compatibility
YubiKey
PKCS#11 / OpenSSL / OpenSC API

Key rotations

Yes

Encryption algorythms

AES-512, AES-256, AES-128
ECIES
ECDSA
RSA (4096 bit or equivalent)

User Interface

Optional web UI (via web browser)

Real-time processing

Yes

Modes of operations

Fully autonomous
Semi-automated
Manual

Hardware requirements (typical)

2 CPU cores, x86-64, 4GB RAM, HDD 20GB

High Availability

Yes, supported.

Software requirements

OS Linux Red Hat, CentOS, Ubuntu
Containers: Docker, LXC, Kubernetes (optionally)

LDAP support (e.g. Active Directory)

Yes

FAQ

Does TurboCat.io store any data?

No, TurboCat.io de-identifies data “on the fly” in realtime because it is a stream processor. There is no data storing within the TurboCat.io tool.

Are there training courses that are necessary to use the tool?

We provide trainings for the TurboCat.io. However the TurboCat.io tool is typically deployed in a very simple way, therefore no specific training is required.

Use cases

Data Encryption for GDPR

Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures."

Encryption is a very powerful security technique that converts or encodes messages and information into unintelligible form. It does so in a way that allows only authorized parties to access it. Unauthorized parties cannot access encrypted data. Data is encrypted using software that utilizes one or more cryptographic keys. Each key is made up of a string of random characters, like letters and numbers. A key converts (encrypts) the original plaintext data into encrypted ciphertext format.

Ciphertext format is secure because it can only be read once decrypted. The encryption keys can be used to convert and decrypt cipher text back into human readable plaintext data. Since this encryption process renders a set of information unreadable and, therefore, unusable to anyone who does not have a valid cryptographic key, GDPR encryption techniques can prove very beneficial to your company if a data breach is ever to occur.

The GDPR has set a strict requirement that all organizations must notify people in the event of a data breach within just 72 hours. If you encrypt your data, however, you will not have to comply with this requirement since any "leaked data" will be totally unusable and unreadable to any unauthorized individuals who view it. The reason is simple: if the data is unintelligible outside of your organization, no information has truly been leaked.

In conclusion, data encryption can prove to be highly effective for keeping your organization in GDPR compliance in combination with other measures. Data encryption can help you avoid harmful data breaches alongside expensive noncompliance fines and penalties.

Encrypt sensitive data in archives and backups

One of the targets of the cyber attacker are archives and backups because they contain the same valuable data as the production database, but they are usually much less protected. For this reason, the privacy protection regulation requires deletion of a person from all archives and backups. This is a very tedious and costly task to implement.

Risk: The cyber attacker steals files with the production database archives. The attacker then extracts all Sensitive Personal Information (SPI) from these archives and publishes the data on the internet or darknet. This has resulted in a so-called data breach and the company is liable under GDPR.

Protection: Applying encryption, anonymization, and pseudonymization to all archives and backups will prevent the attacker from extracting sensitive data from the stolen archive.

Breach example: In 2012, TD Bank misplaced computer backup tapes containing personally identifiable information for 267,000 customers. TD Bank later paid an $850,000 fine for this data breach.
Source: Bank Info Security