
ShardSecure, a leading provider of cloud data security and resilience software, is pleased to announce its receipt of a Notice of Allowance related to our pivotal US patent application covering the current ShardSecure platform. We expect that the USPTO will grant the patent within a few months. This patent covers methods and systems for increasing data security of an organization’s content, partly by (i) breaking the content into shards that are smaller than a predetermined maximum size and (ii) determining a pointer that identifies the location where the shard shall be stored.
This US Patent is part of the initial ShardSecure patent family, which comprises an Australian Patent, Canadian Patent Application, and EP Patent Application. In addition to this initial patent family, ShardSecure remains focused on protecting its innovation through the filing of at least two new patent families leveraging additional technical improvement of the ShardSecure platform.
“At ShardSecure, we help companies regain control of their data with an innovative platform that strengthens data security and privacy, provides agentless protection for unstructured data, and supports cross-border regulatory compliance,” said ShardSecure Co-Founder and CEO Bob Lam. “We are excited to be securing this patent from USPTO, as it further validates what our customers and partners already know:
ShardSecure’s technology offers unique capabilities for protecting data in our modern threat landscape.”
Joe Sorial, VP of Product, added: “The commercial applications of this patent meet a myriad of requirements for mitigating business disruptions due to cloud outages and improving organizations’ operational resilience and security postures. The technology also meets the strict compliance standards of the GDPR/Schrems II ruling, enabling strong cross-border data protection for global operations.”
“As seasoned cybersecurity experts, we evaluate a wide range of data security solutions,” said David Neuman, a senior analyst at TAG Cyber. “ShardSecure’s ability to provide agentless file-level protection and resilience in hybrid cloud, multi-cloud, and on-prem configurations puts it in a unique category. We anticipate that this US patent will strengthen customer trust in the ShardSecure platform and its specific benefits for data protection.”
In the face of rising cyberattacks and operational complexity, ShardSecure helps companies simplify their data security and protection programs. Our innovative, agentless data control platform lets organizations secure their data, whether it resides on-premises, in the cloud, or in multi- and hybrid-cloud architectures. With strong data security and resilience, agentless file-level protection, support for cross-border compliance, native ransomware protection, and simple integration, ShardSecure helps you stay in control of your data.
Fachartikel

Wenn Angreifer selbst zum Ziel werden: Wie Forscher eine Infostealer-Infrastruktur kompromittierten

Mehr Gesetze, mehr Druck: Was bei NIS2, CRA, DORA & Co. am Ende zählt

WinDbg-UI blockiert beim Kopieren: Ursachenforschung führt zu Zwischenablage-Deadlock in virtuellen Umgebungen

RISE with SAP: Wie Sicherheitsmaßnahmen den Return on Investment sichern

Jailbreaking: Die unterschätzte Sicherheitslücke moderner KI-Systeme
Studien

Deutsche Unicorn-Gründer bevorzugen zunehmend den Standort Deutschland

IT-Modernisierung entscheidet über KI-Erfolg und Cybersicherheit

Neue ISACA-Studie: Datenschutzbudgets werden trotz steigender Risiken voraussichtlich schrumpfen

Cybersecurity-Jahresrückblick: Wie KI-Agenten und OAuth-Lücken die Bedrohungslandschaft 2025 veränderten
![Featured image for “Phishing-Studie deckt auf: [EXTERN]-Markierung schützt Klinikpersonal kaum”](https://www.all-about-security.de/wp-content/uploads/2025/12/phishing-4.jpg)
Phishing-Studie deckt auf: [EXTERN]-Markierung schützt Klinikpersonal kaum
Whitepaper

ETSI veröffentlicht weltweit führenden Standard für die Sicherung von KI

Allianz Risk Barometer 2026: Cyberrisiken führen das Ranking an, KI rückt auf Platz zwei vor

Cybersecurity-Jahresrückblick: Wie KI-Agenten und OAuth-Lücken die Bedrohungslandschaft 2025 veränderten

NIS2-Richtlinie im Gesundheitswesen: Praxisleitfaden für die Geschäftsführung

Datenschutzkonformer KI-Einsatz in Bundesbehörden: Neue Handreichung gibt Orientierung
Hamsterrad-Rebell

Cyberversicherung ohne Datenbasis? Warum CIOs und CISOs jetzt auf quantifizierbare Risikomodelle setzen müssen

Identity Security Posture Management (ISPM): Rettung oder Hype?

Platform Security: Warum ERP-Systeme besondere Sicherheitsmaßnahmen erfordern

Daten in eigener Hand: Europas Souveränität im Fokus






