Cooperative Cyber Security (CCS)

Cooperative Cyber Security (CCS) is an entirely new cybersecurity paradigm, exponentially more secure than existing top-level solutions because it is built using the most powerful known cryptographic concepts. Corporations no longer have to rely on individual internal systems that can be overridden by a single person at any given moment. They now have at their disposal the cumulative protective strength of a number of systems from different networks, and even external organizations.


CCS is effective against IT-level threats and cyberattacks as well as social engineering attempts, including CEO fraud, invoice fraud, and supplier or client impersonation.


Cooperative Cyber Security implements the powerful concept of secret sharing, which is information-theoretically secure and cannot be broken. CCS technology shreds data into meaningless pieces of information and stores these unintelligible shreds in multiple secured locations (referred to as “Knoxers”).


CCS Knoxers work collectively but are individually blind to each other’s workings, so that the organization can use the power of the group to protect itself without ever exposing any complete data, and without depending on one single system.


Penetrating a single network or a single organization yields no real value for the attackers. With CCS, the effort required to manipulate data is equal to the cumulative effort required to break into all of the Knoxers at the same time. CCS technology effectively creates a security chain whose strength is determined by the cumulative strength of all of its links.

Powerful Collective Protection

The CCS Advantage

  • Zero-Knowledge - As each of the Knoxers stores only a random part of the data, which is unintelligible on its own, any single Knoxer is essentially blind to the original information.
  • Resistance to Manipulation - Knoxers collectively hold a copy of the original data. Tampering with the data stored by the Knoxers is effectively Impossible, as it would require modifying all of the shreds at the same time.
  • Redundancy and High Availability - CCS uses Verifiable-Secret-Sharing techniques that support the “k-of-n” scheme. Hence the system is highly available and the user does not become dependent on the availability of any specific Knoxer.
  • Seamless Implementation - CCS integrates seamlessly with existing security protocols and requires only a small IT footprint. Furthermore, there are a variety of gradual implementation schemes, with each subsequent step increasing value and security.

See how you too can detect and prevent payment fraud in real time

Let's meet at AFP conference 2019

How to fight back against increasingly sophisticated threats

Protect your company against payments fraud

April 16th, 1:00-2:00 pm (ET)