This Day On The Street
Continue to site
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here

Validian Discusses The Significance And Recent Developments Of Its First-To-Market Next Generation Cyber Security Technology

OTTAWA, Oct. 30, 2013 (GLOBE NEWSWIRE) -- Validian Corp. (OTCQB:VLDI), the first-to-market with the next generation of cyber security technology for the management and protection of digital information, data and assets, today discussed the significance of its technology to non-mobile and mobile application developers, its development progression, as well as Validian's plan to capitalize on it moving forward.

The significance of Validian technology lies in that it is the first and only cyber security technology that provides far greater security and capabilities than secure socket layer (ssl) even when ssl is combined with public key infrastructure (PKI) for both mobile and non-mobile applications over wired and wireless networks:
  • Validian authenticates applications thereby preventing all unauthorized access of any mobile or non-mobile application and thereby preventing cyber attacks directed at both mobile and non-mobile applications, which currently comprise more than 90% of all cyber attacks. ssl and PKI-ssl cannot authenticate applications and therefore cannot prevent these attacks;
  • Validian encrypts all digital information at the data byte level inside the sending application and decrypts the digital information inside the receiving application so that the data never travels unencrypted before the encryption process or after the decryption process. With ssl and PKI-ssl, unencrypted data can be stolen in transit before and after the encryption and decryption process;
  • Validian dynamically changes all cryptographic keys so that no cryptographic keys are stored and therefore cannot be stolen to decrypt encrypted data. ssl and PKI-ssl store the symmetrical key on the end point device and every hacker knows where to find it. An additional advantage of this is that it took over 11 months and $100 million just to change the cryptographic keys once for the U.S. banking industry. Validian would do this in less than one second each and every time for no additional cost;
  • Validian secures peer--to-peer, client-server and server-to-server communications and can both compress and encrypt the same data. ssl and PKI-ssl cannot secure peer-to-peer communications and can only compress OR encrypt the same data - it cannot do both;
  • Validian dynamically changes any policies governing communication of data, including changing encryption algorithms, keys, key life time and level of compression, and distributes these automatically, immediately and transparently to any combination of end points without having to re-develop or re-install the software. ssl and PKI-ssl cannot do this. For example, ssl and PKI-ssl developers must "pick one" algorithm of many available and different parties prefer different algorithms. End point devices like Smartphones must have the same algorithm to communicate encrypted data with each other. Are customers supposed to carry several different Smartphones, each with a different algorithm, just to communicate securely with the rest of their world? Validian has a better solution. Its technology integrates all available algorithms into each Smartphone or end point device and lets the customer choose whatever algorithm they want to use at any point in time, immediately and instantaneously.

Not only can Validian provide far greater security and capabilities than the competition, but it also can be implemented by any developer much easier and faster than ever before. Validian technology is comprised of 2 components: a server component and a client component plus a software development kit (SDK). Validian's SDK can be used by any developer, with or without any security or ssl experience or expertise, to secure any existing or new application within about 2 hours of a one-time, online tutorial and document review. Following the online tutorial and document review, it will take developers anywhere from a half-day to a few days of very easy, straight forward development to secure an application.

The only alternative way to provide this type of security to an application is to integrate ssl, or part of its components, or to link these via a vpn, tunnel or wrapper. Only a limited number of developers have the security or ssl experience and expertise to do this compared to the overall number of mobile and non-mobile application developers. In addition, the process, even done by an expert developer, can take anywhere from 4 months to 2 years of very complicated development for each application, plus the same amount of additional time each and every time they want to change any of the policies (i.e. the algorithm, stored symmetrical key, key length, level of compression, etc) within the application.

1 of 4

Check Out Our Best Services for Investors

Action Alerts PLUS

Portfolio Manager Jim Cramer and Director of Research Jack Mohr reveal their investment tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
Quant Ratings

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
Stocks Under $10

David Peltier uncovers low dollar stocks with serious upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
14-Days Free
Only $9.95
14-Days Free
Dividend Stock Advisor

David Peltier identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Updates with exact steps to take - BUY, HOLD, SELL
Trifecta Stocks

Every recommendation goes through 3 layers of intense scrutiny—quantitative, fundamental and technical analysis—to maximize profit potential and minimize risk.

Product Features:
  • Model Portfolio
  • Intra Day Trade alerts
  • Access to Quant Ratings
Real Money

More than 30 investing pros with skin in the game give you actionable insight and investment ideas.

Product Features:
  • Access to Jim Cramer's daily blog
  • Intraday commentary and news
  • Real-time trading forums
Only $49.95
14-Days Free
14-Days Free
AAPL $93.74 0.00%
FB $117.58 0.00%
GOOG $693.01 0.00%
TSLA $240.76 0.00%
YHOO $36.60 0.00%


Chart of I:DJI
DOW 17,773.64 -57.12 -0.32%
S&P 500 2,065.30 -10.51 -0.51%
NASDAQ 4,775.3580 -29.9330 -0.62%

Free Reports

Top Rated Stocks Top Rated Funds Top Rated ETFs