Digital Identity powered by
Blockchain Technology
Tamper-Proof Logging of
Identity and Access
Locked-Down & Secured
Access to Critical Systems
Blockchain Defined Perimeter
(BDP)
Securing critical systems in the
fast changing enterprise
workplace
www.BlockArmour.com
2 Enterprises are feeling the heat as Cybersecurity incidents
continue to grow and existing solutions struggle to keep pace
64% more
incidents in 2015
than in 2014
Theft of ‘hard’ IP
increased 56% in
2015
Growing attacks on
core / critical
systems
Challenges are
getting bigger, bolder
and more complex
The dramatic increase in networked devices has further complicated the situation as we begin to understand the impact of IoT
The escalating impact and costs today are often measured in the millions
www.BlockArmour.com
3 The growing ‘mobility’ of users and expanding enterprise
perimeter has resulted in greater exposure to attacks
Business drivers for an
extended enterprise
ecosystem
Growing mobile workforce
Ever expanding enterprise
perimeter
Increased sophistication &
reduced cost of cyber-
attacks
Despite spending billions of dollars on cybersecurity solutions, we continue to defend against tomorrows cyber attacks with
yesterday’s technology
While business drivers justify an extended enterprise ecosystem, the need to secure the
critical systems that support it has grown manifold
www.BlockArmour.com
4
Blockchain Defined Perimeter (BDP) offers opportunities to address cyber security challenges in bold new ways - Smarter, faster and
distinctly more effective
Decentralization
Cryptographic
Encryption
Immutability
The Solution: Blockchain Defined Perimeter; enhanced
SDP architecture with Blockchain & TLS Technology
Consensus-based
Control
Software Defined Perimeter (SDP) Blockchain Technology
Developed at the Defense Information Systems Agency
(DISA). Used by the DHS & DoD
SDP
Controller
Accepting
SDP Host
Accepting
SDP Host
Initiating
SDP Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication
from Initiating Host
2. Mutual secure comm.
to Controller
Control Channel
Data Channel
6. Receive list of IP’s
of Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
www.BlockArmour.com
5 Leveraging BDP, organizations can ring-fence critical systems
securely providing access to authorized users and devices
BDP uses the blockchain-based digital signature to authenticate humans, devices and data
BDP delivers a secure extended perimeter using private permissioned blockchain and TLS technology
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
BlockArmour Enterprise
Security Ring
Resource / Services
Admin
User
User
B
B
B
B
B
B
B
B
User
User
www.BlockArmour.com
6 The Result: Next-gen cybersecurity capabilities to protect
critical systems against evolving cyber threats
Its time we reclaimed cybersecurity using emerging technology!
Cryptographically-secure Digital Identity for users & devices
Immutable & Tamper-Proof Logs stored Securely on the Blockchain
Invisible & Locked-Down Critical Systems
Best-in-Class Encryption for Secured Access to Critical Systems
www.BlockArmour.com
7 Experts across industry segments and analysts chime in
with their opinion on SDP and Blockchain technology
Gartner expects the global Software-Defined Perimeter adoption to grow significantly, starting 2017
Source: Gartner
The first generation of the digital revolution
brought us the Internet of information. The
second generation — powered by blockchain
technology — is bringing us the Internet of value:
a new platform to reshape the world of business
and transform the old order of human affairs for
the better
Don Tapscott.
‘Blockchain Revolution’
“Companies spend millions of dollars on
firewalls, encryption and secure access devices,
and it’s money wasted; none of these measures
address the weakest link in the security chain.”
Kevin Mitnick,
“The World’s Most Famous Hacker”
SDP security model has been shown to stop all
forms of network attacks including DDoS, Man-in-
the-Middle, Server Query (OWASP10) as well as
Advanced Persistent Threat (APT)
Cloud Security Alliance
DMZs and legacy VPNs were designed for the
networks of the 1990s and have become obsolete
because they lack the agility needed to protect
digital businesses. Look for products or services
that can expand identity from one to two factors
and then beyond with contextual and adaptive
access controls.
Gartner
www.BlockArmour.com
8 The team at Block Armour is building a next-gen solution for
cybersecurity that delivers BDP
Want to know more? Have a suggestion? We are eager to hear from you.Drop us a line or reach us
via any of the channels below:
+91 9820386446
+65 96536243
@blockarmour
info@blockarmour.com
www.blockarmour.com
Reach Us

Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical systems and cloud infrastructure

  • 1.
    Digital Identity poweredby Blockchain Technology Tamper-Proof Logging of Identity and Access Locked-Down & Secured Access to Critical Systems Blockchain Defined Perimeter (BDP) Securing critical systems in the fast changing enterprise workplace
  • 2.
    www.BlockArmour.com 2 Enterprises arefeeling the heat as Cybersecurity incidents continue to grow and existing solutions struggle to keep pace 64% more incidents in 2015 than in 2014 Theft of ‘hard’ IP increased 56% in 2015 Growing attacks on core / critical systems Challenges are getting bigger, bolder and more complex The dramatic increase in networked devices has further complicated the situation as we begin to understand the impact of IoT The escalating impact and costs today are often measured in the millions
  • 3.
    www.BlockArmour.com 3 The growing‘mobility’ of users and expanding enterprise perimeter has resulted in greater exposure to attacks Business drivers for an extended enterprise ecosystem Growing mobile workforce Ever expanding enterprise perimeter Increased sophistication & reduced cost of cyber- attacks Despite spending billions of dollars on cybersecurity solutions, we continue to defend against tomorrows cyber attacks with yesterday’s technology While business drivers justify an extended enterprise ecosystem, the need to secure the critical systems that support it has grown manifold
  • 4.
    www.BlockArmour.com 4 Blockchain Defined Perimeter(BDP) offers opportunities to address cyber security challenges in bold new ways - Smarter, faster and distinctly more effective Decentralization Cryptographic Encryption Immutability The Solution: Blockchain Defined Perimeter; enhanced SDP architecture with Blockchain & TLS Technology Consensus-based Control Software Defined Perimeter (SDP) Blockchain Technology Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD SDP Controller Accepting SDP Host Accepting SDP Host Initiating SDP Host 1. Centralized Controller 4. List of authorized Accepting Hosts determined 5. Accept communication from Initiating Host 2. Mutual secure comm. to Controller Control Channel Data Channel 6. Receive list of IP’s of Accepting Hosts 3. Mutual secure comm. to Controller 7. Mutual secure comm. channels
  • 5.
    www.BlockArmour.com 5 Leveraging BDP,organizations can ring-fence critical systems securely providing access to authorized users and devices BDP uses the blockchain-based digital signature to authenticate humans, devices and data BDP delivers a secure extended perimeter using private permissioned blockchain and TLS technology Identity & Access Validation Nodes Identity & Access Validation Nodes BlockArmour Enterprise Security Ring Resource / Services Admin User User B B B B B B B B User User
  • 6.
    www.BlockArmour.com 6 The Result:Next-gen cybersecurity capabilities to protect critical systems against evolving cyber threats Its time we reclaimed cybersecurity using emerging technology! Cryptographically-secure Digital Identity for users & devices Immutable & Tamper-Proof Logs stored Securely on the Blockchain Invisible & Locked-Down Critical Systems Best-in-Class Encryption for Secured Access to Critical Systems
  • 7.
    www.BlockArmour.com 7 Experts acrossindustry segments and analysts chime in with their opinion on SDP and Blockchain technology Gartner expects the global Software-Defined Perimeter adoption to grow significantly, starting 2017 Source: Gartner The first generation of the digital revolution brought us the Internet of information. The second generation — powered by blockchain technology — is bringing us the Internet of value: a new platform to reshape the world of business and transform the old order of human affairs for the better Don Tapscott. ‘Blockchain Revolution’ “Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.” Kevin Mitnick, “The World’s Most Famous Hacker” SDP security model has been shown to stop all forms of network attacks including DDoS, Man-in- the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threat (APT) Cloud Security Alliance DMZs and legacy VPNs were designed for the networks of the 1990s and have become obsolete because they lack the agility needed to protect digital businesses. Look for products or services that can expand identity from one to two factors and then beyond with contextual and adaptive access controls. Gartner
  • 8.
    www.BlockArmour.com 8 The teamat Block Armour is building a next-gen solution for cybersecurity that delivers BDP Want to know more? Have a suggestion? We are eager to hear from you.Drop us a line or reach us via any of the channels below: +91 9820386446 +65 96536243 @blockarmour info@blockarmour.com www.blockarmour.com Reach Us