SlideShare a Scribd company logo
Block Armour Secure Cloud Infrastructure and Services with
Blockchain-enabled Cybersecurity
Blockchain Technology
based Digital Identity
Locked-Down & Secured
Access to CloudSystems
Tamper-Proof Loggingof
Identity andAccess
2
49.2%
50.4%
50.0%
55.8%
61.1%
63.1%
63.1%
74.6%
0% 10% 20%
44.3%
30% 40% 50% 60% 70% 80%
Security
Performance
Availability
Hard to integrate with in-house IT
Not enough ability to customize
Worried on demand will cost more
Bringing back in house may be difficult
Regulatory requirements prohibit cloud
Not enough major suppliers yet
% responding 4 or 5
Cloud Computing Infrastructureand PlatformMarket
($ billions 2013-2018e)
Worldwide spending on Public Cloud Computing, 2015-
2020($B)
Gartnerpredictsthe worldwide public cloud servicesmarket will grow 18% in 2017 to $246.8Bup from
$209.2B in2016.
Source: Goldman Sachs Research, IDC, Gartner
12
16
21
28
35
4350
40
30
20
10
0
2013 2014 2015e 2016e 2017e 2018e
$67
$82
$99
$117
$138
$162
2015 2016 2017 2018 2019 2020
Challenges/Issuesascribed tothe‘cloud’/on-demand model (1=not significant, 5=very significant)
www.blockarmour.com
While enterprise Cloud adoption continues to mature and grow,
Security remains the industry’s topconcern
3 Given their strategic nature, Cloud infrastructure and services
have started to come under increasing attack
Business drivers for an
extended enterprise
ecosystem
Growing mobile workforce
Ever expanding enterprise
perimeter
Increased sophistication &
reduced cost of cyber-
attacks
Despite spending billions of dollars on Cloud security solutions, enterprises and service providers continue to defend against
tomorrows cyber attacks with yesterday’s technology
While business drivers justify a cloud-based extended enterprise ecosystem, the need to
secure the cloud resources that support it has grownmanifold
www.blockarmour.com
4 The Solution: Block Armour, a next-gen cybersecurity solution
for Cloud infrastructure, powered by Blockchain technology
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
The platform leverages digital signature based identity and authentication for humans, devices and
data; securely ring-fencing an organization’s cloud servers.
BlockArmour Enterprise
Security Ring
Admin
User
User
Block Armour delivers Blockchain Defined Perimeter (BDP), an enhanced Software-Defined Perimeter using private permissioned
Blockchain and TLS technology
B B
B
Cloud-based Servers
B
B
B
B
B
User
User
www.blockarmour.com
5
Harnessing Blockchain Defined Perimeter (BDP), Block Armour delivers a new breed of digital identity and access management
solutions. Smarter, faster and ready for tomorrow’s cyberattacks
Decentralization
Cryptographic
Encryption
Immutability
The Building Blocks: Block Armour is powered by Software
Defined Perimeter & BlockchainTechnology
Consensus-based
ControlDeveloped at the Defense Information Systems Agency
(DISA). Used by the DHS & DoD
SDP
Controller
1. Centralized Controller
4. List of authorized
Accepting Hostsdetermined
5. Acceptcommunication
from Initiating Host
Accepting
SDP Host
2. Mutual secure comm.
to Controller
Accepting
SDP Host
Control Channel
Data Channel
6. Receive list of IP’s
of AcceptingHosts
Initiating
SDP Host
3. Mutual secure comm.to
Controller
7. Mutual secure
comm.channels
SDP architecture enhanced with Blockchain & TLS Technology - offers opportunities to addressCloud
security challenges in bold new ways.
Software Defined Perimeter (SDP) Blockchain Technology
www.blockarmour.com
6
The platform also facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain
Block Armour’s Zero Trust setup allows for micro segmentation of
users, connected devices as well as Cloud-based infrastructure
www.blockarmour.com
7 The Result: Next-gen cybersecurity to protect your enterprise’s
most critical cloud based systems against evolving cyber threats
Its time you reclaimed cybersecurity and secured cloud servers / services using emerging technology!
Cryptographically-secure Digital Identity for users &devices
Invisible & Locked-Down CloudInfrastructure
Best-in-Class Encryption for Secured Access to Cloud Servers
Immutable & Tamper-Proof Logs stored Securely on the Blockchain
www.blockarmour.com
8 The core team building Block Armour has over four
decades of experience in Cybersecurity andManagement
We have created a highly skilled extended team that has over 100 years combined experience in the most relevant capabilities
needed for this venture.
Leadership Team
Narayan Neelakantan
Co-founder
Cybersecurity expert
Floyd DCosta
Co-founder, Strategy & GtM
Planning, Blockchain Tech
Abhijit D
Co-founder, CTO,
Cybersecurity expert
16 years experience 16 years international 10 years experience in
in infosecurity business experience. cybersecurity. SIM
Former Head of IT Risk Former Management Architecture. Insights
and Compliance and Consultant @Capgemini. @NSE, India.
CISO of India’s National VC and Blockchain Technology Security
Stock Exchange enthusiast
www.blockarmour.com
9 Learn how you can secure your Cloud Infrastructure and
Services using next gensecurity
Drop us a line or reach us via any of the channelsbelow:
+91 9820386446
+65 96536243
@blockarmour
info@blockarmour.com
www.blockarmour.com
Reach Us
www.blockarmour.com

More Related Content

What's hot

Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
FIDO Alliance
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
Justin Hayward
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Block Armour
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
Block Armour
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
FIDO Alliance
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
FIDO Alliance
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
FIDO Alliance
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
FIDO Alliance
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
FIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
FIDO Alliance
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 

What's hot (20)

Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
FIDO Based Consumer Authentication
FIDO Based Consumer AuthenticationFIDO Based Consumer Authentication
FIDO Based Consumer Authentication
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 

Similar to Blockchain Defined Perimeter for Cloud Security

Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Floyd DCosta
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
BlockArmour1
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Block Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Floyd DCosta
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
Nam Yong Kim
 
DigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedgerDigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedger
Rubayat Zahir, CISSP, CISM, CISA, CHFI, CEH
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
Jim Kaplan CIA CFE
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
Happiest Minds Technologies
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
Block Armour
 
eMBlock
eMBlockeMBlock
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
Block Armour
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
Block Armour
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
BlockArmour1
 
Blockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh TamBlockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh Tam
Nguyễn Quang Huy
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Zeeve
 

Similar to Blockchain Defined Perimeter for Cloud Security (20)

Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 
DigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedgerDigiChain Blockhain on HyperLedger
DigiChain Blockhain on HyperLedger
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
eMBlock
eMBlockeMBlock
eMBlock
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORKCYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Blockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh TamBlockchain Technology Sharing Dang - Minh Tam
Blockchain Technology Sharing Dang - Minh Tam
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 

More from Block Armour

Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
Block Armour
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Block Armour
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Block Armour
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
Block Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
Block Armour
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
Block Armour
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Block Armour
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
Block Armour
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
Block Armour
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
Block Armour
 

More from Block Armour (14)

Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
 
Block Armour Case Study
Block Armour Case StudyBlock Armour Case Study
Block Armour Case Study
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust CybersecuitySecuring Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
 
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...IoT Armour: Securing connected devices and critical IoT infrastructure with B...
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Blockchain Defined Perimeter for Cloud Security

  • 1. Block Armour Secure Cloud Infrastructure and Services with Blockchain-enabled Cybersecurity Blockchain Technology based Digital Identity Locked-Down & Secured Access to CloudSystems Tamper-Proof Loggingof Identity andAccess
  • 2. 2 49.2% 50.4% 50.0% 55.8% 61.1% 63.1% 63.1% 74.6% 0% 10% 20% 44.3% 30% 40% 50% 60% 70% 80% Security Performance Availability Hard to integrate with in-house IT Not enough ability to customize Worried on demand will cost more Bringing back in house may be difficult Regulatory requirements prohibit cloud Not enough major suppliers yet % responding 4 or 5 Cloud Computing Infrastructureand PlatformMarket ($ billions 2013-2018e) Worldwide spending on Public Cloud Computing, 2015- 2020($B) Gartnerpredictsthe worldwide public cloud servicesmarket will grow 18% in 2017 to $246.8Bup from $209.2B in2016. Source: Goldman Sachs Research, IDC, Gartner 12 16 21 28 35 4350 40 30 20 10 0 2013 2014 2015e 2016e 2017e 2018e $67 $82 $99 $117 $138 $162 2015 2016 2017 2018 2019 2020 Challenges/Issuesascribed tothe‘cloud’/on-demand model (1=not significant, 5=very significant) www.blockarmour.com While enterprise Cloud adoption continues to mature and grow, Security remains the industry’s topconcern
  • 3. 3 Given their strategic nature, Cloud infrastructure and services have started to come under increasing attack Business drivers for an extended enterprise ecosystem Growing mobile workforce Ever expanding enterprise perimeter Increased sophistication & reduced cost of cyber- attacks Despite spending billions of dollars on Cloud security solutions, enterprises and service providers continue to defend against tomorrows cyber attacks with yesterday’s technology While business drivers justify a cloud-based extended enterprise ecosystem, the need to secure the cloud resources that support it has grownmanifold www.blockarmour.com
  • 4. 4 The Solution: Block Armour, a next-gen cybersecurity solution for Cloud infrastructure, powered by Blockchain technology Identity & Access Validation Nodes Identity & Access Validation Nodes The platform leverages digital signature based identity and authentication for humans, devices and data; securely ring-fencing an organization’s cloud servers. BlockArmour Enterprise Security Ring Admin User User Block Armour delivers Blockchain Defined Perimeter (BDP), an enhanced Software-Defined Perimeter using private permissioned Blockchain and TLS technology B B B Cloud-based Servers B B B B B User User www.blockarmour.com
  • 5. 5 Harnessing Blockchain Defined Perimeter (BDP), Block Armour delivers a new breed of digital identity and access management solutions. Smarter, faster and ready for tomorrow’s cyberattacks Decentralization Cryptographic Encryption Immutability The Building Blocks: Block Armour is powered by Software Defined Perimeter & BlockchainTechnology Consensus-based ControlDeveloped at the Defense Information Systems Agency (DISA). Used by the DHS & DoD SDP Controller 1. Centralized Controller 4. List of authorized Accepting Hostsdetermined 5. Acceptcommunication from Initiating Host Accepting SDP Host 2. Mutual secure comm. to Controller Accepting SDP Host Control Channel Data Channel 6. Receive list of IP’s of AcceptingHosts Initiating SDP Host 3. Mutual secure comm.to Controller 7. Mutual secure comm.channels SDP architecture enhanced with Blockchain & TLS Technology - offers opportunities to addressCloud security challenges in bold new ways. Software Defined Perimeter (SDP) Blockchain Technology www.blockarmour.com
  • 6. 6 The platform also facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain Block Armour’s Zero Trust setup allows for micro segmentation of users, connected devices as well as Cloud-based infrastructure www.blockarmour.com
  • 7. 7 The Result: Next-gen cybersecurity to protect your enterprise’s most critical cloud based systems against evolving cyber threats Its time you reclaimed cybersecurity and secured cloud servers / services using emerging technology! Cryptographically-secure Digital Identity for users &devices Invisible & Locked-Down CloudInfrastructure Best-in-Class Encryption for Secured Access to Cloud Servers Immutable & Tamper-Proof Logs stored Securely on the Blockchain www.blockarmour.com
  • 8. 8 The core team building Block Armour has over four decades of experience in Cybersecurity andManagement We have created a highly skilled extended team that has over 100 years combined experience in the most relevant capabilities needed for this venture. Leadership Team Narayan Neelakantan Co-founder Cybersecurity expert Floyd DCosta Co-founder, Strategy & GtM Planning, Blockchain Tech Abhijit D Co-founder, CTO, Cybersecurity expert 16 years experience 16 years international 10 years experience in in infosecurity business experience. cybersecurity. SIM Former Head of IT Risk Former Management Architecture. Insights and Compliance and Consultant @Capgemini. @NSE, India. CISO of India’s National VC and Blockchain Technology Security Stock Exchange enthusiast www.blockarmour.com
  • 9. 9 Learn how you can secure your Cloud Infrastructure and Services using next gensecurity Drop us a line or reach us via any of the channelsbelow: +91 9820386446 +65 96536243 @blockarmour info@blockarmour.com www.blockarmour.com Reach Us www.blockarmour.com