Addresses Growing Threat of IP Theft

SAN JOSE, Calif. — Mar. 2, 2020 — SPYRUS Solutions, Inc (“SPYRUS”) announced today it has signed a deal with The Texas A&M University System initiating the first phase of a multiphase contract to secure the University’s research from potential intellectual property (IP) theft. SPYRUS develops and deploys cryptographic operating systems, providing the strongest protection for secured identity access, data in motion, data rest and data in process.

The Texas A&M System is deploying a Secure Computing Enclave using the SPYRUS
Enterprise Management (SEMs) Platform. The platform extends a true end-to-end security approach to manage user access, protect data at rest and in transit, and enables enterprises to comply with industry and United States Government (USG) compliance regulations. The SEMs platform enables the Texas A&M System to effectively manage endpoints using the SPYRUS Cryptographic Operating System (SPYCOS) that can be integrated into any computing device. SPYCOS provides precise protection and management of all key material and algorithms necessary to achieve the highest levels of encryption and strong authentication through an easy to use, central, web-based interface. The Texas A&M System has selected to deploy SPYRUS USB 3.0 bootable encrypted solid-state storage drives built with Common Criteria EAL 5+ components running SPYCOS to provide fully certified FIPS 140-2 Level 3 security.

“The Texas A&M University System decided to implement the cryptographic operating system and endpoint management offered by SPYRUS into our Secure Computing Enclave in order to protect the valuable research of our faculty, staff and students,” said Kevin R. Gamache, Ph.D., chief research security officer with The Texas A&M University System. “As a research institute that receives government grants, it is imperative we comply with stringent DFARs regulations. SPYRUS enables us to do so.”

With the USG requiring all universities conducting government granted research to comply with Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012 in accordance with NIST SP 800-171 and an increasingly hostile cybersecurity environment, it is imperative American research universities invest in appropriate cybersecurity solutions to protect IP theft. SPYRUS can help universities secure their networks with scalable cryptographic solutions and endpoint management software on a variety of networks such as the SEMs platform and SPYCOS. With the SPYRUS suite of products, the IT security departments at universities can encrypt all sensitive data, monitor network activity, and “kill” a problematic endpoint remotely, rendering all encrypted data on the device unusable.

“Recently, the Federal Bureau of Investigation and the Department of Justice hosted a conference with the private and academic sectors to raise the alarm on IP theft,” explained Grant Evans, chief executive officer and chairman, SPYRUS. “The US academic sector is a target due to its advanced research and development work. In addition, universities historically have been open environments, encouraging the sharing of work amongst students, professors, companies
and the like. We are pleased to work with Kevin and his team at The Texas A&M System as they create an approach that supports the collaborative aspect of research while also ensuring the security of that research. We believe their approach could be a model for other universities across the nation.”

Learn more about SPYRUS at For more information through SYNNEX Corporation, contact

About SPYRUS Solutions, Inc.

SPYRUS develops and deploys cryptographic operating systems in innovative ways, providing the strongest protection for data in motion, data at rest and data in process. For more than 20 years, SPYRUS has delivered encryption, authentication, and digital content security products to government, financial, and healthcare enterprises. SPYRUS solutions enable customers to meet stringent regulatory requirements for data protections across industries. Connect with SPYRUS on LinkedIn and Twitter.