California Consumer Protection Act

CCPA follows a growing global trend towards data safety compliance, echoing GDPR and changing the face of electronic business. Don’t get left behind.

StrongKey’s technology can help you create a data-first security architecture to protect the core of your business, keeping you and your data safe even as attacks on cloud infrastructure, network breaches, and zero-day events evolve.

CCPA FACTS

Fines can cost up to

$750
 per consumer
per incident

or actual damages, whichever is greater
Companies have until

July 1, 2020

to achieve compliance
Failing to comply after citation can cost up to

$7,500

for intentional negligence

DATA PROTECTION FIRST

This isn’t new to us; we’ve been leading the charge in helping organizations solve for the most difficult encryption regulations since 2006, when PCI DSS entered the scene. The same product and guidance that helped companies around the world achieve PCI compliance easily can do the same for CCPA. We use centralized encryption with strong authentication, giving you the strongest means possible to protect data. Even better, we make it easy.

HOW DOES STRONGKEY HELP WITH CCPA?

Encryption

We address “pseudonymisation and encryption of personal data” through encryption and tokenization.

Privacy by Design

Application-level encryption is our solution to data protection by design and by default.

Data Access and Consent

By using FIDO2 authentication, we provide guaranteed unambiguous consent.

Alteration of Data

Unauthorized alteration of data is easily detected with digital signatures.

WHAT’S INCLUDED

Single-tenant FIPS-certified Hardware

Dedicated appliances that use FIPS 140-2, levels 2 or 3 certified hardware (TPM or HSM). No shared tenants and no outsourced keys.

Secure Open-source Software Stack

Our software employs the most tested and trusted open-source software platforms to ensure the most up-to-date and advanced security available.

Key Management

You designate Key Custodians to control your keys. You control all the keys from day one, always stored securely only on your appliance.

Encryption + Tokenization

Tellaros encrypt and tokenize data at the application layer, making breaches irrelevant throughout the stack.

Replicator

The Tellaro’s automated replication module ensures high availability and disaster recovery with active-active clustering.

REST and SOAP Web Services API

All features of the Tellaro are accessible via simple web services (REST or SOAP) to enable integration within a single workday.

Outstanding Support

StrongKey provides the highest level of customer support to our clients. Our tiered services can be complemented with on-site installation and training, 24/7 phone support, and more.

LEARN MORE ABOUT OUR APPLIANCES

StrongKey appliances are deployed on premises or via virtual machine. 

StrongKey Appliances save the day(ta).

With processing capabilities up to 1,000 transactions per second, the Enterprise solution is your answer to large, complex architectures with scalability for multiple security solutions.

TELLARO E-SERIES
Tellaro meets data privacy compliance, authentication, and encryption needs worldwide.

A smaller, tabletop device, the Tellaro T can execute up to 100 transactions per second, making it the perfect proof-of-concept or mid-size business solution.

TELLARO T-SERIES

WE’RE READY WHEN YOU ARE

Be confident that your customers’ payment and personal information are safe.
CCPA with the best: StrongKey.

GET COMPLIANT