WE BELIEVE THAT OUR TECHNOLOGY IS THE NEXT BIG THING IN PASSWORD SECURITY AND WE INTEND TO PROVE IT

Contact Ray to learn how you can get started with BlindHash today.

Message from the CEO

Thank you for visiting our website to learn more about our company and technology.  I hope you will spend time exploring our site to learn more about what we do.  

 

The world of password security has become so complex over the last few years, it has forced everyone to look for a better way to protect data. Up to this point, best practice has focused on making it difficult for hackers to crack passwords once they have stolen your database. In order to achieve this, more and more computational power has been utilized to slow things down for the potential hacker.  This is very costly as it forces companies to use more horsepower than they really need.  

Good News! We have a solution for you… and it is very affordable.

Our focus is to eliminate offline attacks and ensure that you never have a full breach to begin with. We accomplish this by securing a hash that the hackers can never access.  In other words, there is always a missing piece to the hash puzzle that they will never have even if they steal your company’s entire database.   How do we do this you ask??  Not only is the name of our company BlindHash™, but that is also the description of our patented technology that we use to protect passwords. We are the only company that offers this protection, and we use it to help avoid the cost associated with a breach.  Today, if you have a breach, then you must assume that all passwords have been compromised. You are required to announce this to all of your customers and in some industries you must even alert the national media outlets. This causes a massive PR nightmare for your company as well as puts your clients through the pain of changing passwords thus overloading your help desks. 

We understand that that there is much more to cyber security than just password protection, but at least this piece to the puzzle can be checked off your list by using BlindHash password database protection.  Your focus should be the functionality of your website and how well it serves your customers.  Stop using valuable resources to secure passwords the legacy way, let us handle that for you. Our implementation typically only takes a few days and your customers will not even know that it has been installed.  As you can probably already tell,  I am not the technical brains behind the product, but I can answer some basic questions about how BlindHash™ password database protection works and why it is one of the best investments that any organization with a website can make.  If you'd like to chat, please shoot me an email at info@blindhash.com or call me directly at 919-922-4171.

Sincerely,

Ray McDonald

BlindHash™ CEO

To learn more about Ray and the rest of our team, click here.

 

Blindhash Cyber WAS BORN WHEN...

CTO and Founder Jeremy Spilman's own credentials were stolen on a major social network in 2012.  

 

JEREMY KNEW THERE HAD TO BE A BETTER WAY...

That's when he started developing a new hashing technique to completely protect passwords from offline attacks, even if the password database is stolen. The BlindHash password database protection works in conjunction with a company’s existing password defenses, systems and processes to provide this landmark level of security in the face of persistent attacks.

OUR MISSION IS TO RESTORE TRUST IN PASSWORDS...

And we intend to make that happen by giving companies the power to prevent offline attacks with our award winning technology. Click here to read about our 2016 MassChallenge Accelerator Award.

 

 

OUR
Leadership

TEAM

Our team is dedicated to changing the way the world views password security BUT we like to have fun too.  Learn more about our team by clicking on their photo.

 

EASY INTEGRATION

BlindHash™ password database protection is a single click install on all major platforms, and an open source library for your favorite language. Our solution is easy to add or remove on a per-user basis.

UNDER YOUR CONTROL

Your privacy and security is our only concern. BlindHash™ Cyber knows nothing about your users; not their username, nor their password, not even if a login attempt was successful.

SIMPLE & UNOBTRUSIVE

An additive layer of security which is completely transparent to your users. Keep your existing authentication framework; you stay in complete control.