Modern cybersecurity, for all its advances, is still like searching for a needle in a haystack. Hundreds of billions of dollars are invested in cyber security, yet large-scale cyber breaches continue to be everyday news.
That’s where Honeypotz comes in.
Our security platform, E-Hornet, verifies the integrity of digital assets for cybersecurity. We are planning to develop other solutions for data integrity verification of IoTs, health records, medical prescriptions, insurance policies, legal contracts and financial reports. From your local hospital to retail banks, E-Hornet by Honeypotz is the robust, agile, real-time, and industrial-grade solution the industry has been waiting for.
E-Hornet is still in the concept phase, but we are on track to have a working prototype by May 2017, and a fully functioning platform by end of 2017. Read on to see what the next generation of cybersecurity looks like with E-Hornet!
Modern security is also largely useless against attacks that originate from inside the network — the insider threat. As Edward Snowden has shown, when system administrators have unrestricted access and can modify/delete evidence of their activities, detecting the source of attacks is almost impossible using only perimeter defenses.
Blockchain is the key to our solution and an attractive market opportunity.
Blockchain is like a digital ledger, where all entries are time-stamped and could never be erased. The entries become a time-stamped proof. The power of E-Hornet is that it takes a clean fingerprint signature of a digital asset, converts it into an encrypted hash value using SHA-2 algorithm, and posts the encrypted signature onto the ledger (blockchain) as a proof of clean state.
Blockchain enables E-Hornet to verify the intended configuration and performance of applications and digital assets.
For the first time, KSI enables any network to be attributed. In a KSI attributed network, one can guarantee the true state of any component within that network, meaning any unauthorized change in the state represents an attack, whether internal or external, and can be detected with 100% accuracy.
It’s the difference between searching for needles in a haystack and having real-time certainty of the position and properties of every straw of hay.
E-Hornet solution is based on generating hash-signature digests and posts them on KSI blockchain for time-stamped proof to be used in integrity and identity verification.
As an added optionality where writing speeds are not important, we could use Etherium (public blockchain). In some instances, where it’s required we would use Etherium as a PoP (Proof of Proof). The aggregated entries from KSI (the top of hash-tree) would be posted onto Etherium blockchain as a PoP.
KSI adds a new real-time capability for security professionals by focusing on the integrity of the assets that make up a network — the configuration of every switch and router, firmware, event logs, binaries etc. can be verified independently and in real time.
With this real-time awareness regarding the integrity state of important digital asset components, organizations seeking to protect the integrity of their network can make real-time decisions in the event that the network and/or asset is compromised and quickly identify the cause and specific component(s) responsible for the loss of integrity.
KSI directly supports enhanced continuity of operations, data loss prevention (due to theft or maliciousness), and is a new form of Advanced Persistent Threat (APT) detection when malware infects a crucial network or system component.
KSI allows for forensic auditability, which is the ability to conduct an audit that produces forensically sound and legally admissible evidence.
For digital networks, this means that any action can be documented so that there is a preponderance of evidence of who took it and when it was taken. The evidence is legally acceptable, and can be verified independently by a court or other third party.
We have a partnership with AgileWorks Ltd, an Estonian software development company that has experience with digital signatures.
Our platform is built on Guardtime KSI technology. The underpinned technology is currently in use by US Military, KPMG, Lockheed Martin, and recently was awarded a contract to manage cybersecurity for UK Nuclear powerplants.
After learning out our team below, make sure to request access to the business plan tab of this profile for an inside look into Honeypotz and details on how you can get involved!
The Honeypotz team has worked with software engineers and world-class cybersecurity experts to create a system that would meet the needs of different enterprises, government agencies, military units, and critical industrial infrastructures that rely heavily on data integrity and intended performance of their digital assets.
Vlad is a Wall Street professional with extensive knowledge of capital markets, banking, and technology infrastructure. He has worked for Morgan Stanley and JPMorgan Chase among others. During his Wall Street career, Vlad was a branch manager for 200 traders and implemented different trading systems. He studied optical engineering at St. Petersburg Institute of Precision Mechanics and Optics.
Douglas has extensive expertise in cybersecurity, intellectual property strategy and valuation, cryptocurrency, and blockchain architecture. Additionally, he has extensive connections in the cybersecurity world including some ex-NSA and ex-CIA executives.
Hacen is an enterprise network specialist and business developer with extensive experience in the French public and defense sectors, working for Juniper and Cisco.