Insuranceciooutlook

LegacyArmour: Protecting Tomorrow Today

Sahar M. Ismail, CEO, LegacyArmourSahar M. Ismail, CEO
Cybersecurity is a growing concern, and though cyber-insurance is a common term, few policies cover the total cost of a major breach. LegacyArmour, specializes in cyber-protection, assisting businesses and individuals prepare for the inevitable by providing a data protection insurance program that insures their clients against breach, decryption, and release of information to unauthorized third parties. LegacyArmour protects both individuals’ and organization’s right to privacy and security by serving as a global online service and turnkey portal that secures important digital assets in encrypted vaults.

“Our goal is to jealously and aggressively protect an individual’s or company’s legacy, their stories, and their secrets, ensuring that their information gets to the right people in the future,” said Sahar M. Ismail, CEO of LegacyArmour. According to recent studies, approximately 45 percent of Americans face the danger of passing away without conveying their wishes to others, and about two-thirds of the population possesses no living will or other advance directives. In the majority of these scenarios, unclaimed insurance policies and personal effects are surrendered to the government, depriving rightful beneficiaries. Sahar has risen from the ashes of such a personal incident to offer a product that “empowers and enables people to take control of their own privacy and security.”

One key aspect that differentiates LegacyArmour from its competitors is its deep encryption and vault hardening. Most providers encrypt files after uploading them, allowing hackers to easily intercept the files during the upload process. “Such a scenario can be compared to the futility of locking a steel door with a military grade lock while leaving the window open next to the door,” says Sahar. LegacyArmour encrypts files before uploading; hence they are already secure before they leave the client’s machine. Furthermore, even if one customer’s keys are jeopardized, the hacker cannot apply those keys to the entire client base.


Our goal is to jealously and aggressively protect an individual’s or company’s legacy, their stories, and their secrets, ensuring that their information gets to the right people in the future


“Featuring a deceptively simple user interface, each client’s site and vaults are supported by background protection and a delivery engine,” adds Sahar. In the background, LegacyArmour scans each file with malware software, ensuring that their clients are not backing up corrupt files. Once they are sure that there is no malware, three separate levels of encryption are applied, each with different algorithms and keys. The creation of these custom keys and encryption happens away from the server and only the owner of the information or the designated recipient can decrypt the information. Timely delivery is ensured through constant monitoring of national death index to identify the passing away of a client, which instantly triggers delivery to designated recipient. Vaults can also be delivered in the case of incapacitation, or on a specific date.

LegacyArmour has generated a great deal of interest recently in the banking and insurance industry. In collaboration with major banks, LegacyArmour will soon be introducing their plug and play digital safe deposit box option into their client banks’ portfolios. Using a LegacyArmour smart safe deposit box, the bank can augment their clients’ existing physical safe deposit boxes or, as in the case of one particular bank, completely replace them with the virtual LegacyArmour vault.

LegacyArmour is growing and expanding rapidly and has recently established a firm in the Netherlands to cater to their EU clients in full compliance with EU data protection laws. Within the next six months, there are plans to open branches in London, the Middle East, and in East Asia to protect clients’ data in accordance with local security laws. “We don’t want our customers to feel stressed about cybersecurity and hacking. We want them to rest comfortably knowing that we have their back,” concludes Sahar.