Quick navigation

Guardtime

Guardtime Keyless Signature Infrastructure (KSI) for DevOps Platforms

Real-time verification of the integrity of your network, independently from system admins and outsourced service providers
Value Proposition

Problem

DevOps is becoming the standard framework for making developers work hand-in-glove with operations to make sure whatever software gets built is actually deployable and easily updated, in every platform. The challenge however is that security frameworks have not evolved at the same pace. Cloud Service Providers expose APIs and software interfaces so customers can interact with those services. With the velocity of value-added service delivery components, their associated interfaces, credential management, and increased automation and M2M abstraction, security vulnerabilities are inevitable and credentials can be – and have been – compromised. The early days of SAML implementation for online shopping and CRM systems highlighted the threat to these services. To manage the threats, despite of all the automation in place, the security supply chain is often still a manual process, meaning that the security operational model (tools) and framework (process) are decoupling from the business and rest of IT and there is an urgent and pressing need for trustable automation and an operational model to support it

Solution

KSI provides security automation via attributed networking – Tag, Track and Locate every digital asset with real time attribution back to a machine or human source. By applying that principle to configurations it becomes possible to have real-time verification of the integrity of your network – independently from system administrators and outsourced service providers. There is no longer a need to trust anyone – you can verify all activity independently from the people who are working on your behalf

Features

  • Real time malware alerts based on changed state of assets
  • Detects any misconfiguration, network and/or component/application failure
  • Provides security automation at the data level
  • Eliminates the need for manual supply chain for security anywhere in the process
  • Real-time awareness, real-time incident response, real-time data-loss prevention
Supporting Technology
  • Blockchain
  • Keyless Signature Infrastructure
Standards & Compliance
  • NIST
Customers