We solved the world’s cybersecurity problem…

Millions of years of evolution have taught us that each cell in a living organism must be able to defend itself, and the first line of defense for a living cell is a semipermeable membrane around it, under governance of the DNA contained within, which can gate the things the cell needs and keep the bad things out. That’s pretty much how Certitude Digital AMULET™ technology works (think of data, or “digital assets”, as cells). See the complete article

Watch these simple explainer videos to quickly understand what this technology is all about

Watch other videos…

Certitude Digital has just been featured in Forbes magazine [read the article]


No keys or certificates to be installed, lost, given away or stolen.  Immune from social engineering hacks.



Cross-platform, cross-device, covering all digital forms of intellectual property and/or private information.



Dynamic, environmentally-based criteria, evaluated at the time (and each and every time) access is requested.


Check out AMULET™ technology capabilities versus others in the cybersecurity industry



Define Access

Define Access

Define the access requirements appropriate for the file(s).  As the owner or creator of the file or asset, you know best what the criteria should be to appropriately protect the asset.

Select or create file(s)

Select or create file(s)

Specify the file(s) you want protected, or create a file to be protected.  The safest method is to create your file and never save it as an unprotected file on disk so it will never exist in such a state where it could be compromised.

Save your file

Save your file

Once you’ve identified the AMULET™ criteria set(s) for your file and saved your secure file, you’re done.  Your file is now secured and cannot be accessed without having the criteria met, as defined in your AMULET™ criteria set(s), each and every time access is attempted on the file.


  • Operating system.

  • Process or child thread from which access is being requested.

  • Module from which access is being requested

  • Number of instances of a protected element are already running.

  • Other process in (or not in) the host device’s memory.

  • GPS location testing (supporting inclusive or exclusive polygons).

  • BIOS setting in (or not in) the host device.

  • Installed hardware on (or not on) the host device.

  • Internet address(es) assigned (or not assigned) to the host device.

  • Local file system contents present (or not present).

  • Custom (user-written) criteria.

  • MAC address(es) assigned (or not assigned) to hardware on the host device.

  • Windows registry contents for devices hosting a Windows OS.

  • Remote controls base on contents of specific files and/or results of program execution.

  • Images of the user and environment (for camera-equipped devices)

  • Recordings of auditory environment (for audio-equipped devices).

  • Time (includes date) controlled invocation within ranges, length, patterns, etc…

  • Known Virtual Machines being run in an environment.

  • Logged-on user or user group membership information.

  • User keyboard and mouse activity (or lack thereof).

  • Proactive criteria (see Code Cocoon™ documentation)

Learn more…

Use Case Examples

In this situation, all criteria about the device itself (BIOS tag, IP address, etc…) would all be common across users. Each individual has their own account information in order to log onto the machine. The logged-on username (along with group memberships) is one of the many criteria an AMULET  can use to define access to an individual file.

AMULETs  have a number of criteria which can be defined to prevent robotic use of a digital asset when a user is not present. AMULET  criteria can be defined to require that a user be logged on, even a specific user, and further that there be mouse, keyboard, or touchscreen activity within a certain timeframe of any AMULET  lease request or lease request validation. AMULETs  can have time criteria defined to block any use of a digital asset during certain time periods the user is known to be unavailable.

No matter what the reason or need, AMULETs ™ can be restricted to devices based on what specific file(s) are (or are not) installed on the device, what processes are (or are not) active on the device, or from which modules in a process an access request is coming from. For example, the author could identify a file uniquely associated with the conflicting application, and could then create AMULET ™ file criteria that would deny access to the author’s application if the offending file was present on the host device.



Covers all platforms.  The only solution capable of working without regard to the device platform.

Operating Systems

Operating system agnostic.  The only solution capable of working without regard to the operating system.


Fail-safe design.  Default is to protect the digital asset.

Industry Coverage

Resolves today’s (and tomorrow’s) cybersecurity industry issues.

0 billion
The annual amount being spent on cybersecurity
0 trillion
The annual losses due to cybersecurity breaches by 2021


View Questions

Traditional data security protects containers, not the contents within them.  This is known as Container-Related Digital Asset Protection, also referred to as Endpoint security.

Containers are things like third-party browsers, operating systems, file systems, server farms, or cloud infrastructure.  Once a container is breached, any digital assets within the container are defenseless.

Historically, and even today, so-called “new security techniques” are simply derivatives of the same Container-Related Digital Asset Protection, as providers simply provide additional layers.

Certitude Digital has been featured in Forbes magazine…  “Security Overhauls Are More Essential Than Ever For Financial Companies”

Why do companies continue to follow the same archaic security
strategies while data breaches are at an all-time high?

Digital Guardian • Nate Lord

Losses Due to Cybersecurity Breaches

As Projected by Industry Leaders**

2017 ($800 billion)
2018 ($1.3 trillion)
2019 ($2.1 trillion)
2020 ($3.5 trillion)
2021 ($6+ trillion)

** Cybersecurity Market Report – Cybersecurity Ventures  |  Industry and Security News – Lavasoft  |  Computer Business Review  |  Juniper Research