Ethical Hack Performed by IBM Validates ERUCES Tricryption Solution

KANSAS CITY, MO -- ERUCES Inc., a provider of innovative security software that prevents unauthorized users from reading or tampering with protected data, today announced the results from IBM's Security and Privacy Services report on the "ethical hack" that was recently completed on the ERUCES Tricryption Engine. The IBM report concluded that the Tricryption Engine is one of the best data field protection products in the database encryption market. "The Tricryption Engine was designed to provide the highest level of security for the protection of persistent data," said ERUCES President and CEO, Dr. Bassam Khulusi. "ERUCES is thrilled to receive such strong third party validation of the Tricryption Engine by a company as well-respected as IBM." IBM's ethical hack report found that the ERUCES Tricryption Engine protected end user data from vigorous attack scenarios based on typical external security threats encountered across an extended enterprise. IBM also concluded that the ERUCES Tricryption Engine provides enhanced privacy protection of confidential records from malicious insiders. According to IBM, approximately 80 percent of registered security breaches are from staff within the company. The recent increase of external hacks and network breaches contribute to the problem of implementing strong security technology at the database level. The ERUCES Tricryption Engine is a patent-pending database encryption system that uses industry standard algorithms and integrates with the customers' preferred middleware. The Tricryption Engine employs a unique triple encryption process that prevents unauthorized access to confidential information stored in the database. The Tricryption Engine provides the highest level of data security possible today by using dynamic key management. "When using best practices, confidential information contained in encrypted databases will be protected from compromise by the Tricryption Engine, even from rogue database system administrators," said Guy Denton, global security and privacy services, IBM. IBM uses "ethical hackers" that employ the same tools and techniques as actual intruders to evaluate target systems' security applications. The IBM ethical hackers then report back to the developers with the vulnerabilities they found and instructions for how to remedy them. For more information visit www.tricryption.com or www.ibm.com