Use Case

Doky Inc.
2040 Martin Ave
95050 Santa Clara (CA)

ABOUT US.

Doky is a collaborative platform that provides high-end mail services for B2B and B2C companies. Our services include fully encrypted cloud storage and messaging platform to people who desire seamless communication with the confidence of security.

WE’RE DEPENDABLE…

We pride ourselves on providing total, top-of-the-notch encryption services, using the latest technology to assist our users accomplish their tasks without risk of data loss or security breach.

WE’RE RELIABLE…

We provide adequate backups for updated copies of our customer data, highly-responsive multiple servers with efficient hardware to guard against downtime and failure because we understand the needs of our users and aim to serve them with the best product offerings and robust services.

CASE 1: DATA BREACH PROTECTION

PROBLEM

A top financial services provider that handles a large amount of confidential information, including payroll processing, transaction details, customer information and other services have been facing constant attack from hackers, eavesdropping on their transfer of data through emails, resulting in exfiltration and access from unwanted parties. The data breach caused a significant loss to the company and ruined their reputation. Many customers abandoned their services and used their competitor’s.

THE SOLUTION

The use of Public infrastructure Key (PKI) though secure, proved a burden for a company that draws information from a vast pool of sources and handles an extremely large customer base. Getting to know the particular key to access files from different logs remains a daunting task. Opting for traditional mail services and simpler file transfer option was risky and not a viable option.
Then came Doky, using SSH to log into the server, providing another layer of security for progresses and limiting access to clear technicians. Also, a secure file transfer protocol was put in place to block out any external eavesdropping on the network.

RESULT

Infiltration from cyber hackers has been contained; files and mail shared across the server are now secure and away from access of data from hijackers. The organization has reclaimed the trust of its clients and transactions are securely concluded, every single hour. All these are done without the workers having to memorize impossible passes.

CASE 2: ADVANCED SECURE WORKSPACE COLLABORATION

PROBLEM

This company has been finding it hard to store their content in secured location or work together seamlessly. The methods adopted by them have access to everybody in the workspace to view and edit documents online and in e-mail threads. Documents on projects and counteracts with third-parties and among the workgroup were edited at will and lost at any time. The shared drives used by this company were not providing an organized and systematic way with which access to key documents was restricted or shared only to intended recipients. Working together online thus created clutter and they fell behind on schedule most often times than not.

THE SOLUTION

Doky’s innovative collaboration suite gave absolute control over shared information to only the right sources. Standard security measures are in place to guard against remote access from unintended sources, through multi-factor authentication, download prevention, knitting access time on shared documents and giving view-only permission to select users.

RESULT

Workers got access to what they needed and projects were delivered on time. Contents were stored securely in the cloud using standard data encryption practices, providing seamless collaboration among employees and clutter- free workspaces.

CASE 3: THREAT IDENTIFICATION

PROBLEM

A company’s CISO had been noticing suspicious activities on their network from internal and external sources; log-in attempts, unusual session duration and inactive sessions, connection attempts to bad destinations and on closed ports, abnormal account management, data exfiltration attempts and malware installations in their servers. Inability to detect the particular loophole made a loss in database management and almost resulted in their shutting down operations.

THE SOLUTION

Infections and intrusions from internal and external sources were detected using top-notch anti-malware and antivirus applications and data from IDS/IPS. Data usage per application and response time comparisons was analyzed to identify invalid session activities. Abnormal account activities were monitored using data from AD account management-related activities. The overall vulnerability of their security system was analyzed and standard security practices, using SSL, TLS and SIEM were adopted as a proactive measure for threat management.

RESULT

The network was followed and it stopped the server-to-server spread of malware. The compromised situation was salvaged and the company’s database was corrected. Operations became functional once again.

FAST & SECURED

Our platform has been secured using the latest technologies with security experts working 24/7 to ensure the site is well secured from cyber-attack.


Top Notch Support
24/7 support with our trained customer care representatives.
Contact us
2040 Martin Ave
95050 Santa Clara (CA)