SlideShare a Scribd company logo
w w w . i o t a r m o u r. c o m
1
Next-generation Zero Trust Cybersecurity for the Space Age ;
powered by SDP and Blockchain technology
Military-grade security for space infra
and communication networks
Tamper-proof logging of all access
and connectivity
Locked-down and secured access to
critical control systems
w w w . i o t a r m o u r. c o m
2
The Challenge: Despite
the space industry’s
technical sophistication,
its cybersecurity efforts
have lagged behind that
of other high-tech sectors
In 2014, hackers breached the U.S. weather systems
satellite network (NOAA) that is vital to disaster planning,
aviation, shipping and scores of other crucial uses
A researcher at the Black Hat 2018 conference revealed how
attackers could take control of SATCOM devices to remotely
compromise security and attack planes, boats, and military tech
The International Space Station was infected with a virus
called W32.Gammima.AG in 2008, after a cosmonaut
brought a compromised laptop aboard
Given it’s strategic importance, space systems are increasingly becoming the target of cyberattacks
Space infrastructure has become an integral part of everyday life, with
individuals, businesses and governments relying overwhelmingly on it
w w w . i o t a r m o u r. c o m
3
The Opportunity: With the shift towards Software-defined satellites and systems;
the industry has an opportunity to fix the long-standing security issues
Shift from custom
hardware dependence to
fully digital, virtualized,
software-defined systems
Virtualization of payload
functions and satellite
capabilities using software;
adjustable for different uses
Ability to manage security
holistically alongside the
scaling of data and
compute capabilities
The shift from specific purpose-built, proprietary hardware to more advanced software-defined, modular architectures and open
extensible frameworks allows for security to be built into the core of these next-gen Space systems
w w w . i o t a r m o u r. c o m
The accelerating change
w w w . i o t a r m o u r. c o m
4
The Solution: Block Armour was
accelerated by Airbus and has
developed a next-gen Zero Trust
Cybersecurity solution IoTArmour;
explicitly designed for connected
IoT devices, critical systems and
related communication networks
The solution was featured as one of the Top 25
innovations worldwide in cybersecurity by Accenture
w w w . i o t a r m o u r. c o m
5
Space Armour: Block Armour is extending the solution to deliver Zero Trust
security for the fast-emerging Software-defined Space ecosystem
End-to-end military-grade cybersecurity
Terrestrial Network
Data Centres
Ground Station
Secure Shield Controller
User
Device User
Device
Command
Centre
Mutual
Authentication to
establish Trust
Precise Encrypted Dynamic Network Access
Gateway Admin
Systems
Administration
- Block Armour Agent
4096 bit RSA encryption
w w w . i o t a r m o u r. c o m
6
The Building Blocks: The solution is powered by Software Defined
Perimeter (SDP) architecture & Blockchain technology
SDP architecture renders core systems and communication gateways invisible to attackers; while customized agents along
with private Blockchain technology delivers a new breed of digital identity and access control for all connected devices
Software Defined Perimeter (SDP)
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
All communication between devices and control systems is secured using 4096 bit RSA encryption
Blockchain
Technology
Decentralization
Cryptographic Encryption
Immutability
Consensus-based Control
SDP
Controller
Accepting SDP
Host
Accepting SDP
Host
Initiating SDP
Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication from
Initiating Host
2. Mutual secure comm. to
Controller
Control Channel
Data Channel
6. Receive list of IP’s of
Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
w w w . i o t a r m o u r. c o m
7
The Market and Traction: Projected to grow at a CAGR of 5.6% to $558B by 2026,
the Space economy is emerging as one of the most lucrative industry globally
Completed a PoC to
secure systems for the
world’s largest aircraft
manufacturer
Deployed a demo of the
solution at the Capgemini
Applied Innovation Center
in Singapore
The solution is being
tested at the National
Cybersecurity Lab,
Singapore
As declining launch costs, advances in technology and rising private sector interest is propelling space exploration into a trillion-
dollar industry, Block Armour is stepping up to address the challenges and keep space infra and networks secure
w w w . i o t a r m o u r. c o m
The Traction
w w w . i o t a r m o u r. c o m
8
Collaborative Strategy: We’ve forged strategic alliances with organizations
aligned with our vision and seek to extend that into SpaceTech
Folks we work closely with:
w w w . i o t a r m o u r. c o m
9
Join us as we deliver next-gen
Zero Trust security for the
emerging space economy
Drop us a line or reach us via any of the channels below:
Get in Touch
+65 96536243
+91 9820386446
@blockarmour
info@blockarmour.com
www.blockarmour.com

More Related Content

What's hot

Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Block Armour
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
Arvind Tiwary
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Block Armour
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
Block Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
Block Armour
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Forescout Technologies Inc
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Forescout Technologies Inc
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
Frank Siepmann
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
Forescout Technologies Inc
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Forescout Technologies Inc
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
Forescout Technologies Inc
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 

What's hot (19)

Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environmentsBlock Armour Zero Trust Solution for Hybrid and Distributed IT environments
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 

Similar to Next-generation Zero Trust Cybersecurity for the Space Age

Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
Block Armour
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
BlockArmour1
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
Block Armour
 
Space Armour - Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
Space Armour -  Zero Trust Cybersecurity Mesh for Space Systems and Satellite...Space Armour -  Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
Space Armour - Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
BlockArmour1
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Floyd DCosta
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
WoMaster
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
Steven SIM Kok Leong
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Block Armour
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
Floyd DCosta
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
TouhemiJamel
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
Defence and Security Accelerator
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
officelifehq
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
IJAEMSJORNAL
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 

Similar to Next-generation Zero Trust Cybersecurity for the Space Age (20)

Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
Space Armour - Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
Space Armour -  Zero Trust Cybersecurity Mesh for Space Systems and Satellite...Space Armour -  Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
Space Armour - Zero Trust Cybersecurity Mesh for Space Systems and Satellite...
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Block Armour Brochure
Block Armour BrochureBlock Armour Brochure
Block Armour Brochure
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
SHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptxSHIELD_overview_presentation_INFOCOM2018.pptx
SHIELD_overview_presentation_INFOCOM2018.pptx
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Block Armour

Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
Block Armour
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
Block Armour
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
Block Armour
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
Block Armour
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
Block Armour
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
Block Armour
 

More from Block Armour (9)

Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
 
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space AgeBlock Armour Zero Trust Cybersecurity for the Space Age
Block Armour Zero Trust Cybersecurity for the Space Age
 
Case study fortune 500 final
Case study fortune 500 finalCase study fortune 500 final
Case study fortune 500 final
 
Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity Block Armour: Zero Trust Cybersecurity
Block Armour: Zero Trust Cybersecurity
 
Blcok Armour Digital Vault
Blcok Armour Digital VaultBlcok Armour Digital Vault
Blcok Armour Digital Vault
 
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT SecurityIoT Armour: Blockchain-Enabled IoT Security
IoT Armour: Blockchain-Enabled IoT Security
 
IoT Armour: the Solution
IoT Armour: the SolutionIoT Armour: the Solution
IoT Armour: the Solution
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Next-generation Zero Trust Cybersecurity for the Space Age

  • 1. w w w . i o t a r m o u r. c o m 1 Next-generation Zero Trust Cybersecurity for the Space Age ; powered by SDP and Blockchain technology Military-grade security for space infra and communication networks Tamper-proof logging of all access and connectivity Locked-down and secured access to critical control systems
  • 2. w w w . i o t a r m o u r. c o m 2 The Challenge: Despite the space industry’s technical sophistication, its cybersecurity efforts have lagged behind that of other high-tech sectors In 2014, hackers breached the U.S. weather systems satellite network (NOAA) that is vital to disaster planning, aviation, shipping and scores of other crucial uses A researcher at the Black Hat 2018 conference revealed how attackers could take control of SATCOM devices to remotely compromise security and attack planes, boats, and military tech The International Space Station was infected with a virus called W32.Gammima.AG in 2008, after a cosmonaut brought a compromised laptop aboard Given it’s strategic importance, space systems are increasingly becoming the target of cyberattacks Space infrastructure has become an integral part of everyday life, with individuals, businesses and governments relying overwhelmingly on it
  • 3. w w w . i o t a r m o u r. c o m 3 The Opportunity: With the shift towards Software-defined satellites and systems; the industry has an opportunity to fix the long-standing security issues Shift from custom hardware dependence to fully digital, virtualized, software-defined systems Virtualization of payload functions and satellite capabilities using software; adjustable for different uses Ability to manage security holistically alongside the scaling of data and compute capabilities The shift from specific purpose-built, proprietary hardware to more advanced software-defined, modular architectures and open extensible frameworks allows for security to be built into the core of these next-gen Space systems w w w . i o t a r m o u r. c o m The accelerating change
  • 4. w w w . i o t a r m o u r. c o m 4 The Solution: Block Armour was accelerated by Airbus and has developed a next-gen Zero Trust Cybersecurity solution IoTArmour; explicitly designed for connected IoT devices, critical systems and related communication networks The solution was featured as one of the Top 25 innovations worldwide in cybersecurity by Accenture
  • 5. w w w . i o t a r m o u r. c o m 5 Space Armour: Block Armour is extending the solution to deliver Zero Trust security for the fast-emerging Software-defined Space ecosystem End-to-end military-grade cybersecurity Terrestrial Network Data Centres Ground Station Secure Shield Controller User Device User Device Command Centre Mutual Authentication to establish Trust Precise Encrypted Dynamic Network Access Gateway Admin Systems Administration - Block Armour Agent 4096 bit RSA encryption
  • 6. w w w . i o t a r m o u r. c o m 6 The Building Blocks: The solution is powered by Software Defined Perimeter (SDP) architecture & Blockchain technology SDP architecture renders core systems and communication gateways invisible to attackers; while customized agents along with private Blockchain technology delivers a new breed of digital identity and access control for all connected devices Software Defined Perimeter (SDP) Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD All communication between devices and control systems is secured using 4096 bit RSA encryption Blockchain Technology Decentralization Cryptographic Encryption Immutability Consensus-based Control SDP Controller Accepting SDP Host Accepting SDP Host Initiating SDP Host 1. Centralized Controller 4. List of authorized Accepting Hosts determined 5. Accept communication from Initiating Host 2. Mutual secure comm. to Controller Control Channel Data Channel 6. Receive list of IP’s of Accepting Hosts 3. Mutual secure comm. to Controller 7. Mutual secure comm. channels
  • 7. w w w . i o t a r m o u r. c o m 7 The Market and Traction: Projected to grow at a CAGR of 5.6% to $558B by 2026, the Space economy is emerging as one of the most lucrative industry globally Completed a PoC to secure systems for the world’s largest aircraft manufacturer Deployed a demo of the solution at the Capgemini Applied Innovation Center in Singapore The solution is being tested at the National Cybersecurity Lab, Singapore As declining launch costs, advances in technology and rising private sector interest is propelling space exploration into a trillion- dollar industry, Block Armour is stepping up to address the challenges and keep space infra and networks secure w w w . i o t a r m o u r. c o m The Traction
  • 8. w w w . i o t a r m o u r. c o m 8 Collaborative Strategy: We’ve forged strategic alliances with organizations aligned with our vision and seek to extend that into SpaceTech Folks we work closely with:
  • 9. w w w . i o t a r m o u r. c o m 9 Join us as we deliver next-gen Zero Trust security for the emerging space economy Drop us a line or reach us via any of the channels below: Get in Touch +65 96536243 +91 9820386446 @blockarmour info@blockarmour.com www.blockarmour.com