KANSAS CITY, MO., July 29, 2021 – TripleBlind announced today several upcoming events where the company will highlight new revenue opportunities made possible by increased data sharing and collaboration, while automatically enforcing regulatory standards such as HIPAA and GDPR. TripleBlind’s next generation cryptographic technology enables companies to share sensitive data without that data ever leaving the company’s firewall, and only allowing the data user to perform operations specifically authorized by the data provider.
TripleBlind will participate in these upcoming events:
HIMSS Conference, August 9-13, to be held at Venetian-Sands Expo Center, Caesars Forum Conference Center and Wynn in Las Vegas. TripleBlind co-founder and CEO Riddhiman Das will present on the topic, Unlocking Data Platforms and Marketplaces, on Wednesday, August 11 from 2:15-2:35 p.m. and TripleBlind will exhibit in the Sands Expo Center, level 2, booth #7710. To schedule a meeting with TripleBlind during HIMSS, reach out to firstname.lastname@example.org. Click here to register.
Overcoming Privacy Hurdles: Approaches for Challenges in Data Sharing, Wednesday, August 25 at 12 p.m. CT. This webinar will focus on the opportunities created by enhanced data sharing while enforcing privacy standards such as GDPR and HIPAA. It will include Elizabeth Harding, shareholder at IP law firm Polsinelli, Fatima Khan, senior corporate counsel, privacy and product at leading independent identity provider Okta and Riddhiman Das, co-founder and CEO at TripleBlind. Click here to register.
About TripleBlind TripleBlind’s patented breakthroughs in advanced mathematics arm organizations with the ability to share, leverage and monetize regulated data, such as PII and PHI, and mission-critical enterprise data, such as tax returns and banking transactions. It unlocks the estimated 105 petabytes of data stored by enterprises today that are inaccessible and unmonetized due to privacy concerns and regulations. With TripleBlind, decision-makers generate new revenue for their organizations by gaining deeper insights faster, creating improved modeling and analysis, and collaborating more effectively with customers and partners and even competitors, while enabling enterprises to enforce today’s regulatory standards, such as HIPAA, GDPR and PDPA.
https://tripleblind.ai/wp-content/uploads/2021/07/BusinessBenefits-DataSharing@2x.png14402161TripleBlindhttps://tripleblind.ai/wp-content/uploads/2022/02/TripleBlind-Logo-H-FullColor@4x.pngTripleBlind2021-07-29 19:40:192021-10-27 14:22:45TripleBlind to Highlight Business Benefits of Enhanced Data Sharing and Collaboration at Upcoming Industry Events
https://tripleblind.ai/wp-content/uploads/2021/07/AAMI.png7201080TripleBlindhttps://tripleblind.ai/wp-content/uploads/2022/02/TripleBlind-Logo-H-FullColor@4x.pngTripleBlind2021-07-16 19:27:012022-04-01 15:39:28Improving AI-Enabled Medical Devices with Data Consortiums and Encryption Technology
The data ecosystem is broken. In the current market, if Company A wants to share data with Company B, it has to decrypt it, send it over the internet and then once received, Company B has to replicate it for use. Decrypting and duplicating data comes with multiple risks, including:
Company A cannot put any restrictions on the use of the data,
Both companies face liability concerns,
Both companies are subjected to expensive and time-consuming contracts and negotiations,
Right now, the most popular solution to minimize risk for both companies A and B are secure enclaves. Secure enclaves enable confidential computing, a process that ensures different programs running on the same machine or cloud server cannot access one another’s memory, keeping data in use private. Secure enclaves act as a black box, keeping the data stored separately from other machine processes; subsequently protecting all of the data and code inside the enclave. However, secure enclaves have limitations.
Secure enclaves store data on a public cloud, which solves issues related to keeping data safe from company employees and third-party vendors with access to the same physical hardware. With secure enclaves in place, the possibility of an intentional or unintentional breach is minimized. However, they do not solve privacy challenges from regulations like HIPAA, GDPR and other government regulations. Even with secure enclaves, the path to regulatory compliance is costly and strenuous.
For instance, if a medical research lab wants to share patient data with a drug manufacturer using only secure enclaves, to be HIPAA compliant, the research lab has to remove the 18 PHI identifiers and be anonymized, consult third-party analysts, establish legal terms, negotiate BAA and good faith adherence to terms. Each of those steps cost money, with the last step putting the data at risk of abuse.
Secure Enclaves Do Not Solve Data Privacy Issues on Their Own; TripleBlind Does
As stated above, secure enclaves have been an effective solution for protecting data, but they are limited due to the fact that both the data and algorithm must be in the same physical location. TripleBlind does not have those same constraints. With TripleBlind, enterprises are not restricted by the physical location of their data or algorithm.
By itself, confidential compute is expensive, time intensive and complex. Pairing it with TripleBlind’s Blind Data Utilization Toolbox, simplifies data regulation compliance and eliminates much of the work and cost associated with achieving data de-identification.
By itself, TripleBlind can ensure compliance with any data privacy law or regulation. When combined with secure enclaves, TripleBlind creates a thorough approach to ensure sensitive data is never accessible by unauthorized users, programs, applications or companies at any stage of the data lifecycle.
Comparison of TripleBlind and Secure Enclaves
Secure Enclaves / Confidential Compute
Does not require movement of data residing in multiple locations or countries
Requires data to be compiled in one place
Real time data de-identification with Blind De-Identification
No de-identification; requires manual anonymization and tokenization
Allows for easy aggregation of data from multiple sources while enforcing regulations
Requires a great deal of paperwork, BAA, resources, and time
Enables data operations to occur across the world from anywhere
Does not allow operations on European data to take place from the US
Allows for keeping the raw data in the country during operations
Data must be moved so that the algorithm and the data reside on the
Brings digital rights to the data – enforce any regulation into the rights that govern the data
Does not enable digital rights on the data; trusted-but-curious parties can still access raw data
Easy to use via simple API
Difficult to use – requires complex lower level operations
Blind Learning protects training data leakage from the trained model
No model protection – training data leakage is still possible
Data residency compliant because raw data stays local
Does not solve data residency issues since data needs to be compiled
in one place
Keeps algorithm intellectual property secure
Algorithm can be susceptible to reverse-engineering of intellectual property & training data
Eliminates the need for data sharing agreements
Data sharing agreements are a necessity for this approach
Reduces liability for receiver of data
Even if best practices are followed, the receiver of the data has the raw data which still could be exposed
Reduces liability for sender of data
Sender of data cannot control how the receiver uses it, takes on a lot of risk
Does not address shared hardware compute concerns on public cloud
Specifically addresses shared hardware compute privacy needs on the public cloud
Enforces permissions on how the data can be used
Does not enforce permissions on how the data can be used
Maintains an auditable log of every operation done to every piece of data
Does not keep a auditable log of data operations
Does not require tokenization of data – works with unstructured (untokenizable) data
Requires tokenization of data – not feasible
with unstructured data
No limitations on operations on the data, as long as they are permissible
Accessing the GPU is difficult – training Neural Networks is a challenge
All software (no hardware dependencies) – vulnerabilities can be updated with a software patch
All hardware – vulnerabilities are well known and take years to patch
Secure enclaves on their own are not enough to solve data privacy regulatory issues. Contact us today at email@example.com to learn about how TripleBlind provides enterprise data privacy unbounded by the physical location of the data or the algorithm.
https://tripleblind.ai/wp-content/uploads/2021/07/SecureDataSharing@2x.png14402161Mitchell Robertshttps://tripleblind.ai/wp-content/uploads/2022/02/TripleBlind-Logo-H-FullColor@4x.pngMitchell Roberts2021-07-08 00:08:082021-10-27 19:47:23TripleBlind: A Supplemental Solution to Confidential Compute and Secure Enclaves
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
Essential Website Cookies
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
Other external services
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds: