Searchable Encryption Will Make Today's Databases Obsolete

Searchable Encryption Will Make Today's Databases Obsolete

Today's databases will become obsolete sooner than anyone realizes. They have a fatal flaw that new technology can now remedy. Databases can't protect our information because they can only index and search it while it is in a vulnerable state. Neither encryption at rest nor transport layer encryption solve this problem.

Enterprises spend billions of dollars on cybersecurity, yet massive data breaches continue. Businesses have accepted that protecting the perimeter is not that effective. Many have essentially conceded that they will eventually be breached and are increasing spending on breach mitigation and insurance. Information spends 99.9% of its life sitting in a database waiting to be accessed. Can you imagine the impact of eliminating any threat to information during 99.9% of its life? High performance searchable encryption works and has the performance and functionality needed to replace nearly everything today's databases can do. It also enables a new information architecture that improves information security across the enterprise. High performance searchable encryption will fundamentally change how businesses protect and share information and its eventual widespread adoption is a foregone conclusion.

Many times researchers will announce breakthroughs in technology but it turns out the technology isn't fast enough or practical enough to be used. Other times, companies make announcements but don't back it up by making the technology available for evaluation.

We are backing up our claim of a breakthrough in high performance searchable encryption by making our Black Forest Database Developer Edition, Black Forest Distributed Ledger Developer Edition, and the SDKs available for free download on our web site to developers in the U.S., E.U., Norway, Japan, Australia, and New Zealand. We are currently limiting it to these countries out of an abundance of caution related to U.S. Export Regulations on cryptography.

The developer editions run on Windows or Linux on a single computer and simply require Java 8 and Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files. There are examples for inserting and querying tuples, time series and spatial data. There are also examples demonstrating how to create ledgers, add trustless and immutable transactions, and query the contents of a ledger. Please try the software and examples and let us know what you think!