Digital Identity powered by Blockchain Technology
Tamper-Proof Logging of Identity and Access
Locked-Down & Secured Access to Critical Systems
Blockchain Defined Perimeter
(BDP)
Securing critical systems in the
fast changing enterprise
workplace
www.BlockArmour.com
2 Enterprises are feeling the heat as Cybersecurity incidents continue to grow and existing solutions struggle to keep pace
64% more
incidents in 2015
than in 2014
Theft of ‘hard’ IP
increased 56% in
2015
Growing attacks on
core / critical
systems
Challenges are
getting bigger, bolder
and more complex
The dramatic increase in networked devices has further complicated the situation as we begin to understand the impact of IoT
The escalating impact and costs today are often measured in the millions
www.BlockArmour.com
3 The growing ‘mobility’ of users and expanding enterprise perimeter has resulted in greater exposure to attacks
Business drivers for an
extended enterprise
ecosystem
Growing mobile workforce
Ever expanding enterprise
perimeter
Increased sophistication &
reduced cost of cyber-
attacks
Despite spending billions of dollars on cybersecurity solutions, we continue to defend against tomorrows cyber attacks with
yesterday’s technology
While business drivers justify an extended enterprise ecosystem, the need to secure the
critical systems that support it has grown manifold
www.BlockArmour.com
4
Blockchain Defined Perimeter (BDP) offers opportunities to address cyber security challenges in bold new ways - Smarter, faster and
distinctly more effective
Decentralization
Cryptographic
Encryption
Immutability
The Solution: Blockchain Defined Perimeter; enhanced SDP architecture with Blockchain & TLS Technology
Consensus-based
Control
Software Defined Perimeter (SDP) Blockchain Technology
Developed at the Defense Information Systems Agency
(DISA). Used by the DHS & DoD
SDP
Controller
Accepting
SDP Host
Accepting
SDP Host
Initiating
SDP Host
1. Centralized Controller
4. List of authorized
Accepting Hosts determined
5. Accept communication
from Initiating Host
2. Mutual secure comm.
to Controller
Control Channel
Data Channel
6. Receive list of IP’s
of Accepting Hosts
3. Mutual secure comm. to
Controller
7. Mutual secure
comm. channels
www.BlockArmour.com
5 Leveraging BDP, organizations can ring-fence critical systems securely providing access to authorized users and devicesBDP uses the blockchain-based digital signature to authenticate humans, devices and data
BDP delivers a secure extended perimeter using private permissioned blockchain and TLS technology
Identity & Access
Validation NodesIdentity & Access
Validation Nodes
BlockArmour Enterprise
Security Ring
Resource / Services
Admin
User
User
BB
B
B
BB
B
B
User
User
www.BlockArmour.com
6 The Result: Next-gen cybersecurity capabilities to protect critical systems against evolving cyber threats
Its time we reclaimed cybersecurity using emerging technology!
Cryptographically-secure Digital Identity for users & devices
Immutable & Tamper-Proof Logs stored Securely on the Blockchain
Invisible & Locked-Down Critical Systems
Best-in-Class Encryption for Secured Access to Critical Systems
www.BlockArmour.com
7 Experts across industry segments and analysts chime in with their opinion on SDP and Blockchain technology
Gartner expects the global Software-Defined Perimeter adoption to grow significantly, starting 2017
Source: Gartner
The first generation of the digital revolution
brought us the Internet of information. The
second generation — powered by blockchain
technology — is bringing us the Internet of value:
a new platform to reshape the world of business
and transform the old order of human affairs for
the better
Don Tapscott.
‘Blockchain Revolution’
“Companies spend millions of dollars on
firewalls, encryption and secure access devices,
and it’s money wasted; none of these measures
address the weakest link in the security chain.”
Kevin Mitnick,
“The World’s Most Famous Hacker”
SDP security model has been shown to stop all
forms of network attacks including DDoS, Man-in-
the-Middle, Server Query (OWASP10) as well as
Advanced Persistent Threat (APT)
Cloud Security Alliance
DMZs and legacy VPNs were designed for the
networks of the 1990s and have become obsolete
because they lack the agility needed to protect
digital businesses. Look for products or services
that can expand identity from one to two factors
and then beyond with contextual and adaptive
access controls.
Gartner
www.BlockArmour.com
8 The team at Block Armour is building a next-gen solution for cybersecurity that delivers BDPWant to know more? Have a suggestion? We are eager to hear from you. Drop us a line or reach us
via any of the channels below:
+91 9820386446
+65 96536243
@blockarmour
www.blockarmour.com
Reach Us