SlideShare a Scribd company logo
Safety In Numbers
Protecting us all from the ‘Internet of Everything’
Ian Heron
Director of Strategy & Innovation at OmniCommand Ltd
The Door is Wide Open
 When we secure our houses, we have to consider each
potential entrance and the method by which it might be
exploited
 The more entrances and potential attack methods there
are, the less likely it is that we will successfully prevent
entry
 In computing terms each combination of an entrance and a
method is called an AttackVector.
 With our current generation of software platforms, (Java,
.Net, C++ etc), each individual platform and software
solution usually exposes many AttackVectors, offering a
large number of entrances that are vulnerable to a wide
range of exploitation methods
Compounded by Complexity
 Criminals can reach Software Components through
many ‘doorways’ including:
 network ports, viruses, usb ports, keyboard ports, physical
access, inductive coupling etc
 Once Criminals are ‘in’ they take control using many
different methods including:
 Viruses, embedded scripts, memory faults, spoofing, etc
 To make matters worse each computing device
requires many software components to make it work
 Applications, monitoring, update managers, remote access
services etc
 We add even more components to try and protect the ones
that are already there – but they addAttackVectors too!
 Anti-Virus, Firewalls, Policy Managers etc
 We often put lots of devices together to make a
single end to end solution, (especially for our largest
and most important systems)
 The end result is a staggering array of AttackVectors
that are rarely understood and certainly not all
protected
Compounded by Complexity
Welcome to the Internet of Everything!
 Now we want to connect a Heart Pacemaker to the
Internet.
 We could put a web server and a database in it, then it can provide
control and analytics in real-time to Doctors and Patients
 It can monitor trends sending us emails congratulating us on
improving our heart health
 It can alert medical teams before problems occur
 It can cooperate with other medical devices in our body
 It could save our lives.
 It’s a great idea – opening up amazing new possibilities.
 However, if it gets hacked – we could die.
 If we use existing software solutions and architectures – we
could die.
 We need a different solution.
The OmniFabric Four Step Plan…
 Invent a single software platform that can replace all of
the other software solutions
The OmniFabric Four Step Plan…
 Invent a single software platform that can replace all of
the other software solutions
 Design it to ‘multiplex’ or share ports and other
resources between applications, reducing the number
of ‘open doors’ to a manageable figure
The OmniFabric Four Step Plan…
 Invent a single software platform that can replace all of
the other software solutions
 Design it to ‘multiplex’ or share ports and other
resources between applications, reducing the number
of ‘open doors’ to a manageable figure
 Invent a revolutionary new security gatekeeper to
guard the remaining open doors
The OmniFabric Four Step Plan…
 Invent a single software platform that can replace all of
the other software solutions
 Design it to ‘multiplex’ or share ports and other
resources between applications, reducing the number
of ‘open doors’ to a manageable figure
 Invent a revolutionary new security gatekeeper to
guard the remaining open doors
 Use a radical new internal architecture that makes it as
difficult as possible to find anything to steal or damage
if a criminal does break in:
 Corridors and doors make navigating a house easy
 Modern file systems and Relational databases are just as
familiar and comfortable - easily navigated by a hacker
 But what if our data wasn’t stored in files or databases,
what if our house was more like a beehive?
 How would you find what you were trying to steal?
Step 1 – Invent A Single Software Platform
 The OmniNode is a revolutionary new computing
engine designed to:
 Completely replace all other application platforms
 Be easy to port to new operating systems and
hardware platforms
 Run any program on any system from the tiniest
nano-device to the largest mainframe without
changing, porting or modifying the program
 It is the computing equivalent of a generic toy
brick, capable of being used to construct any
solution
 It is the first platform that makes the ‘Internet of
Everything’ commercially viable and therefore a
realistic possibility
Step 2 – Reduce the Open Doors
 The OmniNode is able to multiplex, (share),
ports between different protocols. It is
possible for all interactions to occur through
a single network port including:
 Web Requests
 Data Requests
 Service Calls
 Remote Procedure Calls
 Software Updates
 Firmware updates
 Monitoring, (alarms and alerts)
 Analytics
 Debugging and Diagnosis
 Every Interaction through a network port
has to get past the Gatekeeper
Step 3 – A Revolutionary New Gatekeeper
 OmniFabric uses a revolutionary new
Security model called ‘Morals & Ethics’
 This model can provide any level of security
from simple authentication and certification
all the way up to complex rules sets that can
combine any of todays existing security
mechanisms with any rules and reference
sources
 This enables a new level of security that can
be precisely tailored to the needs of a
specific application.
 For the first time the need to make a
solution secure can be precisely balanced
with the need to make an application usable
Step 4 – A Radical New Internal Architecture
 Within the OmniNode everything exists
within a new kind of network data structure
 This structure is not addressed in the way
that file systems and relational databases
are, it can only be navigated using the tools
within the OmniNode itself – all of which are
secured by ‘Morals & Ethics’.
 If an intruder is able to navigate the contents
of the OmniNode – it can only be with your
permission.
 You are in control.
What Does This Mean?
 With careful thought appliances can be made more secure than ever before
 Operating systems can be stripped down to their most basic configuration
 Only the OS and the OmniNode need to be installed
 Direct human interaction for support or maintenance will not be necessary
 ExistingAnti-Virus and many other security solutions are unnecessary
 There is no need to move files on and off the platform except from trusted sources through the OmniNode
& Gatekeeper
 All communications are controlled by intelligentAgents within the node itself
 All software updates are controlled through the Carousel on the Node which carries a
dazzling array of countermeasures designed to ensure their integrity and correct
operation
 Agents offer behavioural controls that can even detect unexpected activity from
software that is already installed
 Rollback, repair or replacement of any aberrant components can be completely
automatic and immediate
Everything is an Appliance
 Now everything can safely do the same job, in the same way, running the same
programs as part of the same cloud - the only difference between a wrist-watch and a
mainframe is how quickly they do it.
 So everything is an Appliance
 OmniFabric is fully Horizontally
scalable
 Even the biggest mainframe or
cloud service can be treated the
same way
 Every solution from a Firewall to an
ERP system or MediaGateway can
be deployed as an appliance.
 OmniFabric clouds can incorporate
devices of any size and from any
manufacturer – all safely managed
by ‘Morals & Ethics’
Take the Next Step…..Take the Next Step…
 Contact us at OmniCommand Ltd for a demonstration of OmniFabric technology.
 The Future Beckons….

More Related Content

What's hot

bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
Sam Kumarsamy
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
ITrust - Cybersecurity as a Service
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
Priyanka Aash
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
Symantec
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
Priyanka Aash
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016
Splunk
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
Priyanka Aash
 
Security technology
Security technologySecurity technology
Security technology
Praveen Kumar V
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Qualys
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
AlienVault
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
Cristian Garcia G.
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
Priyanka Aash
 

What's hot (20)

bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
bcs_sb_TechPartner_SAPlatform_Damballa_EN_v1a (2)
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
IoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control DesignIoT Hardware Teardown, Security Testing & Control Design
IoT Hardware Teardown, Security Testing & Control Design
 
Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016Splunk Discovery Day Düsseldorf 2016
Splunk Discovery Day Düsseldorf 2016
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
Overview of Google’s BeyondCorp Approach to Security
 Overview of Google’s BeyondCorp Approach to Security Overview of Google’s BeyondCorp Approach to Security
Overview of Google’s BeyondCorp Approach to Security
 
Security technology
Security technologySecurity technology
Security technology
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
 

Similar to Safety In Numbers - Protecting Us All From The Internet of Things

Endpoint security
Endpoint securityEndpoint security
Endpoint security
S.M. Towhidul Islam
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
SofiaCarter4
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
ANJUMOHANANU
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
Exclusive Networks ME
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
Nikhil Mittal
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
white paper
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
SecPod Technologies
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
SecPod Technologies
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
Boni Yeamin
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
Pamela Wright
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
surya kumar palla
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
Chandrashekhar B
 

Similar to Safety In Numbers - Protecting Us All From The Internet of Things (20)

Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
10 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 202310 Best DevSecOps Tools for 2023
10 Best DevSecOps Tools for 2023
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
security onion
security onionsecurity onion
security onion
 
Teensy Programming for Everyone
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
 
Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Safety In Numbers - Protecting Us All From The Internet of Things

  • 1. Safety In Numbers Protecting us all from the ‘Internet of Everything’ Ian Heron Director of Strategy & Innovation at OmniCommand Ltd
  • 2. The Door is Wide Open  When we secure our houses, we have to consider each potential entrance and the method by which it might be exploited  The more entrances and potential attack methods there are, the less likely it is that we will successfully prevent entry  In computing terms each combination of an entrance and a method is called an AttackVector.  With our current generation of software platforms, (Java, .Net, C++ etc), each individual platform and software solution usually exposes many AttackVectors, offering a large number of entrances that are vulnerable to a wide range of exploitation methods
  • 3. Compounded by Complexity  Criminals can reach Software Components through many ‘doorways’ including:  network ports, viruses, usb ports, keyboard ports, physical access, inductive coupling etc  Once Criminals are ‘in’ they take control using many different methods including:  Viruses, embedded scripts, memory faults, spoofing, etc
  • 4.  To make matters worse each computing device requires many software components to make it work  Applications, monitoring, update managers, remote access services etc  We add even more components to try and protect the ones that are already there – but they addAttackVectors too!  Anti-Virus, Firewalls, Policy Managers etc  We often put lots of devices together to make a single end to end solution, (especially for our largest and most important systems)  The end result is a staggering array of AttackVectors that are rarely understood and certainly not all protected Compounded by Complexity
  • 5. Welcome to the Internet of Everything!  Now we want to connect a Heart Pacemaker to the Internet.  We could put a web server and a database in it, then it can provide control and analytics in real-time to Doctors and Patients  It can monitor trends sending us emails congratulating us on improving our heart health  It can alert medical teams before problems occur  It can cooperate with other medical devices in our body  It could save our lives.  It’s a great idea – opening up amazing new possibilities.  However, if it gets hacked – we could die.  If we use existing software solutions and architectures – we could die.  We need a different solution.
  • 6. The OmniFabric Four Step Plan…  Invent a single software platform that can replace all of the other software solutions
  • 7. The OmniFabric Four Step Plan…  Invent a single software platform that can replace all of the other software solutions  Design it to ‘multiplex’ or share ports and other resources between applications, reducing the number of ‘open doors’ to a manageable figure
  • 8. The OmniFabric Four Step Plan…  Invent a single software platform that can replace all of the other software solutions  Design it to ‘multiplex’ or share ports and other resources between applications, reducing the number of ‘open doors’ to a manageable figure  Invent a revolutionary new security gatekeeper to guard the remaining open doors
  • 9. The OmniFabric Four Step Plan…  Invent a single software platform that can replace all of the other software solutions  Design it to ‘multiplex’ or share ports and other resources between applications, reducing the number of ‘open doors’ to a manageable figure  Invent a revolutionary new security gatekeeper to guard the remaining open doors  Use a radical new internal architecture that makes it as difficult as possible to find anything to steal or damage if a criminal does break in:  Corridors and doors make navigating a house easy  Modern file systems and Relational databases are just as familiar and comfortable - easily navigated by a hacker  But what if our data wasn’t stored in files or databases, what if our house was more like a beehive?  How would you find what you were trying to steal?
  • 10. Step 1 – Invent A Single Software Platform  The OmniNode is a revolutionary new computing engine designed to:  Completely replace all other application platforms  Be easy to port to new operating systems and hardware platforms  Run any program on any system from the tiniest nano-device to the largest mainframe without changing, porting or modifying the program  It is the computing equivalent of a generic toy brick, capable of being used to construct any solution  It is the first platform that makes the ‘Internet of Everything’ commercially viable and therefore a realistic possibility
  • 11. Step 2 – Reduce the Open Doors  The OmniNode is able to multiplex, (share), ports between different protocols. It is possible for all interactions to occur through a single network port including:  Web Requests  Data Requests  Service Calls  Remote Procedure Calls  Software Updates  Firmware updates  Monitoring, (alarms and alerts)  Analytics  Debugging and Diagnosis  Every Interaction through a network port has to get past the Gatekeeper
  • 12. Step 3 – A Revolutionary New Gatekeeper  OmniFabric uses a revolutionary new Security model called ‘Morals & Ethics’  This model can provide any level of security from simple authentication and certification all the way up to complex rules sets that can combine any of todays existing security mechanisms with any rules and reference sources  This enables a new level of security that can be precisely tailored to the needs of a specific application.  For the first time the need to make a solution secure can be precisely balanced with the need to make an application usable
  • 13. Step 4 – A Radical New Internal Architecture  Within the OmniNode everything exists within a new kind of network data structure  This structure is not addressed in the way that file systems and relational databases are, it can only be navigated using the tools within the OmniNode itself – all of which are secured by ‘Morals & Ethics’.  If an intruder is able to navigate the contents of the OmniNode – it can only be with your permission.  You are in control.
  • 14. What Does This Mean?  With careful thought appliances can be made more secure than ever before  Operating systems can be stripped down to their most basic configuration  Only the OS and the OmniNode need to be installed  Direct human interaction for support or maintenance will not be necessary  ExistingAnti-Virus and many other security solutions are unnecessary  There is no need to move files on and off the platform except from trusted sources through the OmniNode & Gatekeeper  All communications are controlled by intelligentAgents within the node itself  All software updates are controlled through the Carousel on the Node which carries a dazzling array of countermeasures designed to ensure their integrity and correct operation  Agents offer behavioural controls that can even detect unexpected activity from software that is already installed  Rollback, repair or replacement of any aberrant components can be completely automatic and immediate
  • 15. Everything is an Appliance  Now everything can safely do the same job, in the same way, running the same programs as part of the same cloud - the only difference between a wrist-watch and a mainframe is how quickly they do it.  So everything is an Appliance  OmniFabric is fully Horizontally scalable  Even the biggest mainframe or cloud service can be treated the same way  Every solution from a Firewall to an ERP system or MediaGateway can be deployed as an appliance.  OmniFabric clouds can incorporate devices of any size and from any manufacturer – all safely managed by ‘Morals & Ethics’
  • 16. Take the Next Step…..Take the Next Step…  Contact us at OmniCommand Ltd for a demonstration of OmniFabric technology.  The Future Beckons….