Banner pic 1.jpg

REVOLUTIONARY CYBERSECURITY

through networks of trust

 

Today's security model - problem size and solution scope

50 % of Web Business has had a breach in 2015 - 91% of all healthcare organizations in last two years.

Trustnetworks solution blocks all breach effects in real-time.

The average breach cost is $4m - 4x cost increase, dependent on sector!

Trustnetworks reduce breach cost by orders of magnitude.

Time to fix costs money - 201 days to identify breach, 70 days to mitigate. Half the time, reduce cost by 20%.

Trustnetworks reduces resolution time to zero.

The fortress security model problem - why current solutions are not working

The Key-Lock model isn’t working. Individuals and organizations on the Internet are secured within digital fortresses.

  • Users are overwhelmed with passwords and tokens (so they use the same one).
  • Distributed 2-factor auth. aids management overhead, not inherent weaknesses.
  • Trust has been equated with a key (is this entity entitled to use this key?).
  • Concentrates risk (the prize is inside a single target entity).
  • As we connect more things, security decreases as the attack surface increases.

When fortresses fail, they fail completely! Only a minor breach opens the doors to APTs.

  • Attack through stealth and subversion of trust (steal the key, steal the identity/trust).
  • Very often defense is reactive not pro-active and unlikely to be comprehensive.
  • You can do everything right to secure your fortress and still be broken into.

Why Now? Why Us? - the network effect increases security

Mature commodity internet-scale graph technology. Humans have built fragmented trust relationship graphs we can leverage(social media). Sourcing trust with the network effect will strengthen security exponential.

Mature commodity internet-scale graph technology.

Humans have built fragmented trust relationship graphs we can leverage(social media).

Sourcing trust with the network effect will strengthen security exponential.

 
Cloud model maturity (platform and revenue). Security increases through more connections to the internet, the direct opposite of the existing fortress model, where more connections decrease security. Security scales with the network effect.

Cloud model maturity (platform and revenue).

Security increases through more connections to the internet, the direct opposite of the existing fortress model, where more connections decrease security.

Security scales with the network effect.

 
Key resources with unique talent and experience. Cyber Security experts agree behavioral algorithms are required. Our model distributes trust, leverages existing internet scale datasets, while ensuring personal privacy of behavioral data.

Key resources with unique talent and experience.

Cyber Security experts agree behavioral algorithms are required.

Our model distributes trust, leverages existing internet scale datasets, while ensuring personal privacy of behavioral data.

The Team - deep background in technology, delivery and cybersecurity

Simon Meacham Co-Founder CEO 22 years of technical leadership across government and industry.  

Simon Meacham Co-Founder CEO

22 years of technical leadership across government and industry.

 

Dan Meacham Director of Product Management 17 years of product management and consultancy in business intelligence, data & analytics.

Dan Meacham Director of Product Management

17 years of product management and consultancy in business intelligence, data & analytics.

Mark Adams CTO 25 years developer, technical leader, innovator. Develops, scale and deep expertise in networks and protocols.

Mark Adams CTO

25 years developer, technical leader, innovator. Develops, scale and deep expertise in networks and protocols.

 

the network is the security