Guardtime's VOLTA platform provides a solution for managing personal data in compliance with the GDPR regulations coming into force on May 25, 2018.
KSI based solutions that help insurance companies to better run their business and offer new cyber-related products.
The key components to redraw the ways in which supply chain challenges can be solved, providing a solution to uniquely verify data, across boundaries, in real time, and independently of any third parties.
Black Lantern hardware platform contains state of the art anti-tamper functionality capable of defending itself and your network against remote attacks and can resist even physical reverse engineering.
Exabyte-scale integrity for cloud environments, proving the absence of compromise and ensuring complete transparency, accountability and auditability for service providers customers.
Enhance the continuity of operations for C-RAN by real-time detection of misconfigu-rations and network, component or application integrity failures.
Massive-scale, data-level instrumentation and real-time validation services for connected vehicle ecosystems.
Real-time situational awareness into infrastructure assets to support continuity of operations.
Solution provides tools to stay in control before, during and after the data breach incident.
Guardtime offers Defence and Aerospace industry next- generation anti-tamper hardware and integrity solutions to detect and mitigate network compromise.
Ensures reliable data, executable and configuration integrity, as well as mutual auditability in private, public or hybrid cloud environments.
KSI makes it impossible for insiders or outsiders to manipulate government data, allowing complete transparency, accountability and attribution.
Detection of network state compromise with real-time tools for isolating compromised components.
Solutions that help customers detect data poisoning, enable the transition to cloud and bring regulatory compliant archiving to data lakes.
Automated Big Data Archiving made simple, affordable and secure through KSI-based integrity instrumentation.
Discover, analyse, and report on insider manipulation across the digital assets, in real-time.
Authentication and real-time verification of devices as well as end to end chain of custody for data streams.
Transparent software solution for making every object in the object store tamper evident, making regulatory compliant archiving in commodity hardware possible.
Data-centric security is one the key opportunities that the telecom operators can take advantage of to differentiate their service offering.