Guardtime MIDA enables organizations to regain full control of their cloud and IoT infrastructure through cryptographically enforceable baselines and real-time breach detection.
Instead of relying on correlation analysis of events from remote infrastructure such as cloud, IoT or 5G networks, MIDA starts with control policies for infrastructure (firmware, virtual machine and the digital assets that make up a network).
Each digital asset on the network has an associated digital token which provides the cryptographic integrity and provenance of that asset back to a control policy. Any change in the environment out of policy generates a high-quality alert that can be remediated in real-time - finally closing the loop between policy and infrastructure - what we call cryptographically enforceable policy.
With this approach, real-time breach detection (in seconds) becomes possible when there is a change in infrastructure that is out of policy as well as dynamic attestation of compliance for external auditors.
For business owners, Guardtime MIDA delivers the following benefits:1. DECREASED TIME TO DETECTION
Pinpoint breaches and out of policy state changes in real-time using cryptographically enforceable baselines
2. DECREASED OPERATIONAL COSTS
Decreased storage requirements, automated event detection and alerting.
3. CROSS ORGANIZATIONAL ACCOUNTABILITY
Detect variances to multi-party agreements and SLAs with cryptographic verification.
4. STREAMLINED AUDIT AND COMPLIANCE
Artifacts for event and state detection are portable and easily understandable from legal, audit, and compliance perspectives
5. SEAMLESS AND COMPATIBLE
No need to rip and replace, Events and Insights are easily consumed by current investments.
Problem: In complex environments, the time to detection of a problem can be measured in months or even years.
MIDA Answer: MIDA significantly reduces time to detection by capturing configurable, accurate and concise state information at the source rather than verbose logs.
Problem: Meaningful Events are complex and expensive to pinpoint with traditional mechanisms and require ever-increasing resources.
MIDA Answer: MIDA Snapshots reduce the input to correlate events significantly, decreasing costs for processing and storing events to provide actionable insights and realtime event correlation for alerts.
Problem: The ability to create ad-hoc infrastructure and the nature of Cloud leads to a lack of visibility of Shadow-IT and unauthorized Cloud Assets, creating cost run-overs, operational issues, and security gaps.
MIDA Answer: MIDA produces configurable MIDA Snapshots enabling dynamic cloud asset discovery and real-time awareness of cloud infrastructure
Problem: Organizations have no method of validating if logs have been changed or are authentic
MIDA Answer: MIDA captures the System State Changes in the MIDA Snapshots. These allow each granular State Capture to be containerized and correlated, but forever maintain their original value.
Problem: Cloud and Managed Services architectures require portable and scalable cryptographic proof of event data
MIDA Answer: The KSI Blockchain provides an independent trust anchor enabling cross-boundary and scalable cryptographic proof
Problem: Cloud infrastructures provide elastic scalability for virtual machines leading to complex accountability and awareness for monitoring services.
MIDA Answer: The KSI Blockchain allows each MIDA Agent and Service to be granularly credentialed to enable true accountability and chain of custody of the MIDA Snapshots.