SlideShare a Scribd company logo
1 of 10
Download to read offline
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. 
 
FEATURES & BENEFITS
Entity Network Translation (ENT)
An Advanced, Fully Decentralized, Core Trust Technology
for Powerful, Trusted Micro-Networks & True Digital Ownership
ENT TECHNOLOGIES
9466 Black Mountain Road, Suite 250
San Diego, CA 92126
1.844.837.4696
www.ent.net
inquire@ent.net
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 1 of 9
 
Top 16 Benefits of ENT
ENT is an advanced, fully decentralized, core trust technology for
powerful, trusted micro-networks and true digital ownership.
The ENT system is more resilient and robust than PKI, more versatile and
efficient than the blockchain, and eliminates central authorities and manual key
management – resulting in some amazing benefits for today’s digital systems.
Owners Are In Control
Owners design and control
every aspect of their own
trusted micro-networks – from
identity to access to data – and
ENT enforces their rules.
True Digital Ownership
For the first time ever in the
digital space, ENT makes digital
assets and access as exclusive,
valuable and transferable as
real-world physical property.
Identity For Everything
Humans, devices, software,
data, groups, physical objects,
concepts like currency and
corporations – anything can
have a permanent identity.
Human Processes Are
Assets, Not Liabilities
ENT maps real-world trust,
accountability, roles and
processes directly into strong,
authentic digital networks.
Trusted Computing
Software processes and data
rights are enforced everywhere
for a lawful and predictable
environment across any
execution context.
Grid Computing
“Big data” processing without
centralization and loss of
privacy is possible using
commodity storage, compute
resources and bandwidth.
Scalable Security
Users set arbitrary levels of
access for their trusted
relationships – from open to
complex authorizations.
Robust Data Privacy
Data owners have full control
of their data’s exposure – from
public availability to military-
grade data masking.
Growth Is Beneficial
More proliferation means
more inter-woven, trusted
relationships. The system gets
stronger as it gets bigger.
Resilient, Robust
Decentralized design
eliminates single points of
failure and allows for rapid
recovery in case of disruption.
Versatile, Agile
From IoT to military to
healthcare and more, ENT is
useful for any purpose and
easily adapts to changes.
Interoperable
The system operates in a
standard way across difficult,
diverse domains and
execution environments.
Cost Effective, Efficient
Owner-driven provisioning
and discrete operations are
inexpensive and maximally
efficient, yielding high ROI.
Scalable Operation
ENT can scale to arbitrary
levels of operation – from
embedded processes to
complex global systems.
Stable Governance
ENT’s open standard and
governance model provides a
well-proven foundation for
real-world global trust.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 2 of 9
 
Trust System Evolution: From Trust Domains to Trusted Micro-Networks
Current: Trust Domains
Centralized, not interoperable.
Domain owner issues, arbitrates & protects
identities & data. Very vulnerable.
Security is secondary, privacy not possible.
(Includes PKI, symmetric, PGP, blockchain)
ENT: Trusted Micro-Networks
Fully decentralized, interoperable.
Each entity has individual identity, trusted
connections, access levels, data ownership –
determined by owner, no central authority.
Exponential security & privacy is emergent.
Examples of Trusted Micro-Networks & Ownership
These are all direct entity-to-entity transactions. No third party authority or domain is involved.
Medical Records
Bob owns his medical record,
meaning he has exclusive,
transferable access to it and its
commodity storage location. His
doctor needs access. She signs
Bob’s required terms of use. She
now has directly permissioned,
time-limited access to the data.
Secure Actuation
A field squad leader must send a
drone navigation actuation
command through a specific
commodity mobile device and signal
source, and command must
authenticate the change as well. The
drone will not change without
authorization from all four entities.
Hardened Devices
Each processor on a device has
its own ENT identity, security
access, and data privacy. These
components form a trust
network. They can either be
accessed individually or vote
as a group to authenticate
device actions.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 3 of 9
 
ENT Security: End-to-End, Arbitrary Levels of Strength
With ENT, security is a natural outcome of a decentralized system.
Resilient identity. No central points of failure. No external dependencies.
Entity-level access rules that scale to arbitrary levels. Heterogeneous encryption.
1) Decentralized, Resilient Identity: RKI-based ID
is owner-determined and not tied to a central
vulnerable authority or manual key process.
2) Precisely Scoped Network: Direct entity-to-entity
micro-networks with no third-party knowledge or
middleman. Reduced surface area for attack.
3) Integrated Entities, No External Dependencies:
Black box operation reduces attack vectors.
4) Owner-Determined, Explicit, Multi-Auth
Connections Only: Security access can scale
to arbitrary levels that exactly fit owner
needs. Unauthorized requests rejected.
5) Heterogeneous Encryption: Encrypted
channel can use any algorithm or method,
including custom. Diversity is desirable.
ENT Data Privacy: Decentralized System Mitigates Breach Risks
With ENT, data privacy is a natural outcome of a decentralized system.
Data partitioned into small pieces across many locations. Datum-level identity.
Datum-level access rules that scale to arbitrary levels. Advanced privacy techniques.
1) Per-Datum Access Authorization Rules: Data is
a first-class system entity with arbitrary levels of
access control for authorized entities.
2) Partitioning: Data exposure is limited to a single
source or record that is strongly identified and
changes locations across nodes. Eliminates
catastrophic breaches where attackers move
laterally through large data stores.
3) Authentic Schema for Data Assurance: Via
semantic matching, users can have
assurance of data composition, type and
what elements are being exposed.
4) Heterogeneous Encryption: Data encrypted
in transit at and rest. Encryption channel
can use any algorithm or method, including
custom. Diversity is desirable.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 4 of 9
 
ENT Increases Developer ROI with a Standard Trust Stack
Developers simply plug their value-add applications into a global, uniform trust layer.
Drain on resources and liability are reduced because owners manage their own trust.
Current Tech: Manual/Fixed Stack, Low ROI
Stack is high-effort, custom, often duplicated.
Developers have full system visibility.
Manual, top-down administration of system.
High developer liability, low ROI.
ENT: Owner-Driven Platform, High ROI
ENT is pluggable, open standard trust layer.
Developers provide value-add app framework.
Owners manage their own system configuration.
Low developer liability, high ROI.
ENT System Components
ENT has just four simple components with many versatile deployment options.
1) Nodes: The node is ENT’s execution environment.
Nodes execute and enforce the user-determined,
authorized operations as directed by verinyms.
Nodes operate autonomously and run in a wide
variety of environments.
2) API: Standard programmatic access to the node.
3) User Interface: This is the “super-admin”
interface that gives an owner oversight and
administrative control for all their verinyms.
4) Verinyms: These are the most important
component in the ENT system. Verinyms are
uniform, integrated “virtual machine” objects
that represent any entity in the ENT system.
Verinyms have powerful RKI-based network
functionality such as identity, title, control,
resolution, storage and more. Verinyms
exchange authorized services with other
verinyms, carry their own data, and are mobile
across nodes – a fully decentralized system.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 5 of 9
 
FEATURE BENEFITS
Relational Key
Infrastructure (RKI)
ENT’s system is built on RKI -
a new, patent-pending,
fundamental advancement
in asymmetric crypto
architecture.
Fundamental advancement in crypto architecture. Increases
the utility of asymmetric keys in systems.
Solves long-standing issues previously thought to be
intractable in asymmetric cryptography such as the
“continuity boundary” – maintaining credentials in the event
of a loss or compromise of private keys in a distributed
system.
Order-of-magnitude more strength, resilience, efficiency and
utility than current trust technologies like PKI, PGP,
symmetric logins and blockchains.
RKI patterns allow ENT to be built with an elegantly simple
recombinant construction. This reduces the surface areas for
exploits in the core system components.
The ENT system uses RKI patterns for robust, authentic
network services: Namespacing, title, control, group
behavior, distribution, routing, notifications and more.
With RKI, the robustness and resilience of a system actually
increases in correlation with an increase in participants.
FEATURE BENEFITS
Decentralized
Architecture Via
Verinyms
Verinyms are network entity
objects in the ENT system.
Verinyms are anything that
can be represented digitally:
Humans, devices, data & files,
software, groups, physical
objects and abstract concepts
like corporations or currency.
Verinyms operate like little
virtual machines, forming
direct and trusted connections
with each other. Verinyms are
Robust, fault-tolerant operation. No single points of failure.
Black box operation with no external code dependencies.
Reduces attack surface.
Discrete and trusted “closed circuit” verinym connections
limit visibility of transactions and eliminate man-in-the-
middle vulnerabilities and attacks.
Efficient, precisely scoped networking.
Only three simple components are required to operate and
configure verinyms. Simplicity reduces attack surface.
Addressable identity: Every network entity, including data, is
a first-class actor with a strong, durable and resilient identity
that is also a system-wide address for access, actuation and
transactions.
Infinite scalability: Network sizes, numbers of verinyms, and
numbers of transactions can scale to arbitrary levels.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 6 of 9
 
device-independent, mobile
and self-contained -
transporting their own access
rules and data with them as
they move through the system.
Increased security: Data access, control, and other network
operations must be whitelisted at the individual verinym
level.
Increased privacy: Big data pools can be reduced to single
datum endpoints – less value per datum decreases the
incentive for data breach.
Increased privacy: Easier to apply advanced techniques for
limiting data visibility on smaller pieces of data.
High network availability: ENT nodes can run in any
commodity bandwidth, compute and storage environment.
High network availability: Entities can instantiate in any
ENT node, meaning they have maximum network mobility
for better performance and availability.
Uniform design means unified, interoperable platform –
even across different domains.
ENT is fully integrated platform that includes user
management, authentication, routing, storage and data
handling. Developers simply plug in their value-add
applications to the system for a high ROI.
Integration into existing systems can be incremental with
minimal impact to existing internal and external
infrastructure.
FEATURE BENEFITS
Autonomic Operation
and Enforcement
ENT is a self-governing
automated system that
enforces user-defined rules.
Machine-managed trust operations remove the need for
third-party oversight. Reduces security and privacy
vulnerabilities.
Machine-managed enforcement of user rules remove the
need for third-party arbitration. Reduces security and
privacy vulnerabilities.
Machine enforcement of user-defined rules means that
verinym owners can manage the entire trusted endpoint
lifecycle – issuance, provisioning, renewal, and deactivation.
High-quality trust with an exponential reduction in cost.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 7 of 9
 
FEATURE BENEFITS
User-Determined
Rules & Administration
ENT eliminates centralized
administration and gives users
full provisioning and control
of their own identities,
security, privacy and trusted
networks.
Users request and provision their own verinyms with
authorization schemes and configurations that exactly fit
their use context and requirements. No third-party is ever
involved.
Users can configure the durability and resilience of their
verinym identities to arbitrary levels.
Users can configure the strength of their verinym security
and data privacy to arbitrary levels.
Users have exclusive ownership over their digital identities
and assets, and can build their value and exchange them just
like physical property.
Users completely control their verinym configuration and
connections – where it’s stored, who they allow to control it,
who is connected to its data and for how long, and more.
Users can map their real-world trust structures directly into
the digital space, creating a custom digital transaction
network that is predictable and trustworthy.
User-centric decentralized design means security and
privacy are always optimal and discrete at every entry point.
Users configure their own identities, authentication
requirements, routing, storage, and data management.
Application developers simply plug in their value-add
applications to the user’s pre-existing system for a high ROI.
Users can provision on-the-fly policy changes that are
instantly enforced across their verinym networks.
FEATURE BENEFITS
High-Assurance
System Operation
ENT has world-class, global
scale assurance features that
make it suitable for any kind
of trust application
Optional end-to-end encryption for data in transit and at rest
Heterogeneous algorithms for signing and encryption
mitigate the risk of systemic compromises
Authentic schema ensures that the composition of the data
being exchanged in the system conforms to a trusted format
and that users are aware of the privacy and security
implications of its various components (such as image
metadata that might reveal location).
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 8 of 9
 
The ENT components have a very slim footprint on the disk,
in memory and over the network. ENT’s efficient form and
operation suitable for applications in a wide variety of
environments - from slim edge sensors to embedded chips to
complex global networks.
ENT is environment agnostic, able to run on any commodity
hardware/software over any type of transport – 4G, WiFi,
Zigbee, Zwave, etc.
ENT’s architecture is very extensible, allowing for the
authenticated insertion of new components such as cutting-
edge or proprietary algorithms, network protocols, industry-
specific verinym services and so on.
Authentic and authorized pull-forward updates keep the
system free of legacy bugs and vulnerabilities.
The ENT API is a uniform software interface that allows
third-party applications to have automated control of
verinym provisioning and behavior in their domain.
The Enternet Manager UI allows users to have full visibility
and control of all their verinyms in an easy contact-manager
style interface. The UI is extensible to include remote
management, privacy metrics and data usage patterns, etc.
ENT is a simple open-standard technology that is easy to
deploy and inexpensive to operate – no prohibitive cost or
proprietary licensing requirements. ENT is designed to be a
global trust infrastructure that is accessible, stable, well-
governed and widely available in perpetuity - for anyone,
anywhere, for any purpose.
DATA SHEET // FEATURES & BENEFITS
1.844.837.4696 | inquire@ent.net | www.ent.net
DATA SHEET // FEATURES & BENEFITS
Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 9 of 9
 
ENT: A Next-Gen Trust Infrastructure for Modern Digital Systems
ENT is a next-generation trust infrastructure for our complex 21st century digital systems.
ENT's groundbreaking technology transforms connected systems like the Internet into a
uniformly safe, predictable, lawful and trustworthy environment.
ENT connects entities together directly in trusted micro-networks without any middleman.
An entity is anything that can be represented digitally - humans, devices, data & files, software,
physical assets, abstract concepts like corporations and currency, and groups of any or all of
these. Every entity has a uniform structure that lets it interoperate with any other entity, no
matter who owns it, as long as the owner allows it. Every entity has its own durable identity,
ownership, control, security and data privacy built in.
ENT's automated system is fully user-driven. Users have exclusive ownership over all their
entities, and can set security and privacy rules to whatever level fits their requirements. Users are
in complete control of their entity configuration and connections - where it's stored, who they
allow to control it, who's connected to its data, and more. Users can directly translate their offline
trusted relationships directly into the digital space. And because users own their entities, they can
build up their exclusive value and exchange them just like physical properties.
ENT is versatile, adaptive and useful for many purposes. ENT can ensure trusted transactions
between entities in all kinds of multi-trillion dollar marketplaces like the Internet of Things,
healthcare, government and military, banking, telecom, networking, transportation, physical
goods and anti-counterfeiting, supply chains and many more. ENT works in any environment,
from embedded components to commodity servers to complex global networks. ENT also works
over any connection, from 4G to WiFi to specialized signals like ZWave and Zigbee.
ENT is built on Relational Key Infrastructure (RKI), a fundamental advancement in crypto
systems. RKI is orders-of-magnitude more strong, resilient, efficient and broadly useful than
current technologies like PKI and blockchains. RKI also has the curious property of making a
system more secure and resilient when more entities are added to it.
ENT is a simple open-standard technology that is easy to deploy and inexpensive to operate.
ENT is designed to be a global trust infrastructure that is accessible, stable, always updated, well-
governed and available in perpetuity - for anyone, anywhere, for any purpose.
Contact us today for more information!

More Related Content

What's hot

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...IJCNCJournal
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Deepak Mishra
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...eSAT Publishing House
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing SecurityCloud Genius
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 

What's hot (20)

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
 
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
 
information security technology
information security technologyinformation security technology
information security technology
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Cloud computing Security
Cloud computing SecurityCloud computing Security
Cloud computing Security
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 

Similar to ENT-Data-Sheet_Features-Benefits

Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxkkhhusshi
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideInstaSafe Technologies
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureExclusive Networks ME
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformVertex Holdings
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET Journal
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsTom Kopko
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 

Similar to ENT-Data-Sheet_Features-Benefits (20)

The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Fortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative GuideFortinet vs Instasafe Zero Trust - A Comparative Guide
Fortinet vs Instasafe Zero Trust - A Comparative Guide
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Iot 7-12-2021
Iot 7-12-2021Iot 7-12-2021
Iot 7-12-2021
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Gigamon - Network Visibility Solutions
Gigamon - Network Visibility SolutionsGigamon - Network Visibility Solutions
Gigamon - Network Visibility Solutions
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 

ENT-Data-Sheet_Features-Benefits

  • 1. DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved.    FEATURES & BENEFITS Entity Network Translation (ENT) An Advanced, Fully Decentralized, Core Trust Technology for Powerful, Trusted Micro-Networks & True Digital Ownership ENT TECHNOLOGIES 9466 Black Mountain Road, Suite 250 San Diego, CA 92126 1.844.837.4696 www.ent.net inquire@ent.net
  • 2. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 1 of 9   Top 16 Benefits of ENT ENT is an advanced, fully decentralized, core trust technology for powerful, trusted micro-networks and true digital ownership. The ENT system is more resilient and robust than PKI, more versatile and efficient than the blockchain, and eliminates central authorities and manual key management – resulting in some amazing benefits for today’s digital systems. Owners Are In Control Owners design and control every aspect of their own trusted micro-networks – from identity to access to data – and ENT enforces their rules. True Digital Ownership For the first time ever in the digital space, ENT makes digital assets and access as exclusive, valuable and transferable as real-world physical property. Identity For Everything Humans, devices, software, data, groups, physical objects, concepts like currency and corporations – anything can have a permanent identity. Human Processes Are Assets, Not Liabilities ENT maps real-world trust, accountability, roles and processes directly into strong, authentic digital networks. Trusted Computing Software processes and data rights are enforced everywhere for a lawful and predictable environment across any execution context. Grid Computing “Big data” processing without centralization and loss of privacy is possible using commodity storage, compute resources and bandwidth. Scalable Security Users set arbitrary levels of access for their trusted relationships – from open to complex authorizations. Robust Data Privacy Data owners have full control of their data’s exposure – from public availability to military- grade data masking. Growth Is Beneficial More proliferation means more inter-woven, trusted relationships. The system gets stronger as it gets bigger. Resilient, Robust Decentralized design eliminates single points of failure and allows for rapid recovery in case of disruption. Versatile, Agile From IoT to military to healthcare and more, ENT is useful for any purpose and easily adapts to changes. Interoperable The system operates in a standard way across difficult, diverse domains and execution environments. Cost Effective, Efficient Owner-driven provisioning and discrete operations are inexpensive and maximally efficient, yielding high ROI. Scalable Operation ENT can scale to arbitrary levels of operation – from embedded processes to complex global systems. Stable Governance ENT’s open standard and governance model provides a well-proven foundation for real-world global trust.
  • 3. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 2 of 9   Trust System Evolution: From Trust Domains to Trusted Micro-Networks Current: Trust Domains Centralized, not interoperable. Domain owner issues, arbitrates & protects identities & data. Very vulnerable. Security is secondary, privacy not possible. (Includes PKI, symmetric, PGP, blockchain) ENT: Trusted Micro-Networks Fully decentralized, interoperable. Each entity has individual identity, trusted connections, access levels, data ownership – determined by owner, no central authority. Exponential security & privacy is emergent. Examples of Trusted Micro-Networks & Ownership These are all direct entity-to-entity transactions. No third party authority or domain is involved. Medical Records Bob owns his medical record, meaning he has exclusive, transferable access to it and its commodity storage location. His doctor needs access. She signs Bob’s required terms of use. She now has directly permissioned, time-limited access to the data. Secure Actuation A field squad leader must send a drone navigation actuation command through a specific commodity mobile device and signal source, and command must authenticate the change as well. The drone will not change without authorization from all four entities. Hardened Devices Each processor on a device has its own ENT identity, security access, and data privacy. These components form a trust network. They can either be accessed individually or vote as a group to authenticate device actions.
  • 4. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 3 of 9   ENT Security: End-to-End, Arbitrary Levels of Strength With ENT, security is a natural outcome of a decentralized system. Resilient identity. No central points of failure. No external dependencies. Entity-level access rules that scale to arbitrary levels. Heterogeneous encryption. 1) Decentralized, Resilient Identity: RKI-based ID is owner-determined and not tied to a central vulnerable authority or manual key process. 2) Precisely Scoped Network: Direct entity-to-entity micro-networks with no third-party knowledge or middleman. Reduced surface area for attack. 3) Integrated Entities, No External Dependencies: Black box operation reduces attack vectors. 4) Owner-Determined, Explicit, Multi-Auth Connections Only: Security access can scale to arbitrary levels that exactly fit owner needs. Unauthorized requests rejected. 5) Heterogeneous Encryption: Encrypted channel can use any algorithm or method, including custom. Diversity is desirable. ENT Data Privacy: Decentralized System Mitigates Breach Risks With ENT, data privacy is a natural outcome of a decentralized system. Data partitioned into small pieces across many locations. Datum-level identity. Datum-level access rules that scale to arbitrary levels. Advanced privacy techniques. 1) Per-Datum Access Authorization Rules: Data is a first-class system entity with arbitrary levels of access control for authorized entities. 2) Partitioning: Data exposure is limited to a single source or record that is strongly identified and changes locations across nodes. Eliminates catastrophic breaches where attackers move laterally through large data stores. 3) Authentic Schema for Data Assurance: Via semantic matching, users can have assurance of data composition, type and what elements are being exposed. 4) Heterogeneous Encryption: Data encrypted in transit at and rest. Encryption channel can use any algorithm or method, including custom. Diversity is desirable.
  • 5. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 4 of 9   ENT Increases Developer ROI with a Standard Trust Stack Developers simply plug their value-add applications into a global, uniform trust layer. Drain on resources and liability are reduced because owners manage their own trust. Current Tech: Manual/Fixed Stack, Low ROI Stack is high-effort, custom, often duplicated. Developers have full system visibility. Manual, top-down administration of system. High developer liability, low ROI. ENT: Owner-Driven Platform, High ROI ENT is pluggable, open standard trust layer. Developers provide value-add app framework. Owners manage their own system configuration. Low developer liability, high ROI. ENT System Components ENT has just four simple components with many versatile deployment options. 1) Nodes: The node is ENT’s execution environment. Nodes execute and enforce the user-determined, authorized operations as directed by verinyms. Nodes operate autonomously and run in a wide variety of environments. 2) API: Standard programmatic access to the node. 3) User Interface: This is the “super-admin” interface that gives an owner oversight and administrative control for all their verinyms. 4) Verinyms: These are the most important component in the ENT system. Verinyms are uniform, integrated “virtual machine” objects that represent any entity in the ENT system. Verinyms have powerful RKI-based network functionality such as identity, title, control, resolution, storage and more. Verinyms exchange authorized services with other verinyms, carry their own data, and are mobile across nodes – a fully decentralized system.
  • 6. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 5 of 9   FEATURE BENEFITS Relational Key Infrastructure (RKI) ENT’s system is built on RKI - a new, patent-pending, fundamental advancement in asymmetric crypto architecture. Fundamental advancement in crypto architecture. Increases the utility of asymmetric keys in systems. Solves long-standing issues previously thought to be intractable in asymmetric cryptography such as the “continuity boundary” – maintaining credentials in the event of a loss or compromise of private keys in a distributed system. Order-of-magnitude more strength, resilience, efficiency and utility than current trust technologies like PKI, PGP, symmetric logins and blockchains. RKI patterns allow ENT to be built with an elegantly simple recombinant construction. This reduces the surface areas for exploits in the core system components. The ENT system uses RKI patterns for robust, authentic network services: Namespacing, title, control, group behavior, distribution, routing, notifications and more. With RKI, the robustness and resilience of a system actually increases in correlation with an increase in participants. FEATURE BENEFITS Decentralized Architecture Via Verinyms Verinyms are network entity objects in the ENT system. Verinyms are anything that can be represented digitally: Humans, devices, data & files, software, groups, physical objects and abstract concepts like corporations or currency. Verinyms operate like little virtual machines, forming direct and trusted connections with each other. Verinyms are Robust, fault-tolerant operation. No single points of failure. Black box operation with no external code dependencies. Reduces attack surface. Discrete and trusted “closed circuit” verinym connections limit visibility of transactions and eliminate man-in-the- middle vulnerabilities and attacks. Efficient, precisely scoped networking. Only three simple components are required to operate and configure verinyms. Simplicity reduces attack surface. Addressable identity: Every network entity, including data, is a first-class actor with a strong, durable and resilient identity that is also a system-wide address for access, actuation and transactions. Infinite scalability: Network sizes, numbers of verinyms, and numbers of transactions can scale to arbitrary levels.
  • 7. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 6 of 9   device-independent, mobile and self-contained - transporting their own access rules and data with them as they move through the system. Increased security: Data access, control, and other network operations must be whitelisted at the individual verinym level. Increased privacy: Big data pools can be reduced to single datum endpoints – less value per datum decreases the incentive for data breach. Increased privacy: Easier to apply advanced techniques for limiting data visibility on smaller pieces of data. High network availability: ENT nodes can run in any commodity bandwidth, compute and storage environment. High network availability: Entities can instantiate in any ENT node, meaning they have maximum network mobility for better performance and availability. Uniform design means unified, interoperable platform – even across different domains. ENT is fully integrated platform that includes user management, authentication, routing, storage and data handling. Developers simply plug in their value-add applications to the system for a high ROI. Integration into existing systems can be incremental with minimal impact to existing internal and external infrastructure. FEATURE BENEFITS Autonomic Operation and Enforcement ENT is a self-governing automated system that enforces user-defined rules. Machine-managed trust operations remove the need for third-party oversight. Reduces security and privacy vulnerabilities. Machine-managed enforcement of user rules remove the need for third-party arbitration. Reduces security and privacy vulnerabilities. Machine enforcement of user-defined rules means that verinym owners can manage the entire trusted endpoint lifecycle – issuance, provisioning, renewal, and deactivation. High-quality trust with an exponential reduction in cost.
  • 8. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 7 of 9   FEATURE BENEFITS User-Determined Rules & Administration ENT eliminates centralized administration and gives users full provisioning and control of their own identities, security, privacy and trusted networks. Users request and provision their own verinyms with authorization schemes and configurations that exactly fit their use context and requirements. No third-party is ever involved. Users can configure the durability and resilience of their verinym identities to arbitrary levels. Users can configure the strength of their verinym security and data privacy to arbitrary levels. Users have exclusive ownership over their digital identities and assets, and can build their value and exchange them just like physical property. Users completely control their verinym configuration and connections – where it’s stored, who they allow to control it, who is connected to its data and for how long, and more. Users can map their real-world trust structures directly into the digital space, creating a custom digital transaction network that is predictable and trustworthy. User-centric decentralized design means security and privacy are always optimal and discrete at every entry point. Users configure their own identities, authentication requirements, routing, storage, and data management. Application developers simply plug in their value-add applications to the user’s pre-existing system for a high ROI. Users can provision on-the-fly policy changes that are instantly enforced across their verinym networks. FEATURE BENEFITS High-Assurance System Operation ENT has world-class, global scale assurance features that make it suitable for any kind of trust application Optional end-to-end encryption for data in transit and at rest Heterogeneous algorithms for signing and encryption mitigate the risk of systemic compromises Authentic schema ensures that the composition of the data being exchanged in the system conforms to a trusted format and that users are aware of the privacy and security implications of its various components (such as image metadata that might reveal location).
  • 9. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 8 of 9   The ENT components have a very slim footprint on the disk, in memory and over the network. ENT’s efficient form and operation suitable for applications in a wide variety of environments - from slim edge sensors to embedded chips to complex global networks. ENT is environment agnostic, able to run on any commodity hardware/software over any type of transport – 4G, WiFi, Zigbee, Zwave, etc. ENT’s architecture is very extensible, allowing for the authenticated insertion of new components such as cutting- edge or proprietary algorithms, network protocols, industry- specific verinym services and so on. Authentic and authorized pull-forward updates keep the system free of legacy bugs and vulnerabilities. The ENT API is a uniform software interface that allows third-party applications to have automated control of verinym provisioning and behavior in their domain. The Enternet Manager UI allows users to have full visibility and control of all their verinyms in an easy contact-manager style interface. The UI is extensible to include remote management, privacy metrics and data usage patterns, etc. ENT is a simple open-standard technology that is easy to deploy and inexpensive to operate – no prohibitive cost or proprietary licensing requirements. ENT is designed to be a global trust infrastructure that is accessible, stable, well- governed and widely available in perpetuity - for anyone, anywhere, for any purpose.
  • 10. DATA SHEET // FEATURES & BENEFITS 1.844.837.4696 | inquire@ent.net | www.ent.net DATA SHEET // FEATURES & BENEFITS Proprietary content © 2015 ENT Technologies, Inc. All Rights Reserved. Page 9 of 9   ENT: A Next-Gen Trust Infrastructure for Modern Digital Systems ENT is a next-generation trust infrastructure for our complex 21st century digital systems. ENT's groundbreaking technology transforms connected systems like the Internet into a uniformly safe, predictable, lawful and trustworthy environment. ENT connects entities together directly in trusted micro-networks without any middleman. An entity is anything that can be represented digitally - humans, devices, data & files, software, physical assets, abstract concepts like corporations and currency, and groups of any or all of these. Every entity has a uniform structure that lets it interoperate with any other entity, no matter who owns it, as long as the owner allows it. Every entity has its own durable identity, ownership, control, security and data privacy built in. ENT's automated system is fully user-driven. Users have exclusive ownership over all their entities, and can set security and privacy rules to whatever level fits their requirements. Users are in complete control of their entity configuration and connections - where it's stored, who they allow to control it, who's connected to its data, and more. Users can directly translate their offline trusted relationships directly into the digital space. And because users own their entities, they can build up their exclusive value and exchange them just like physical properties. ENT is versatile, adaptive and useful for many purposes. ENT can ensure trusted transactions between entities in all kinds of multi-trillion dollar marketplaces like the Internet of Things, healthcare, government and military, banking, telecom, networking, transportation, physical goods and anti-counterfeiting, supply chains and many more. ENT works in any environment, from embedded components to commodity servers to complex global networks. ENT also works over any connection, from 4G to WiFi to specialized signals like ZWave and Zigbee. ENT is built on Relational Key Infrastructure (RKI), a fundamental advancement in crypto systems. RKI is orders-of-magnitude more strong, resilient, efficient and broadly useful than current technologies like PKI and blockchains. RKI also has the curious property of making a system more secure and resilient when more entities are added to it. ENT is a simple open-standard technology that is easy to deploy and inexpensive to operate. ENT is designed to be a global trust infrastructure that is accessible, stable, always updated, well- governed and available in perpetuity - for anyone, anywhere, for any purpose. Contact us today for more information!