Resources for Organizations



Behind the epidemic of cyberattacks, malware, online predation, data breaches, ransomware, identity theft, IoT-borne DDoS attacks, and other digital plagues is inauthenticity.

You can't fight inauthenticity by trying to determine the intentions and character of the sender of a stream of bits. Rather, you eliminate inauthenticity with Authenticity™.

Authenticity in the Enterprise™ provides:

  • Digital Identity Certificates that carry a measure of their own reliability – the product of our rigorous enrollment procedures.
  • CredentialBridge™ linking the existing identity credentials used by your organization to PKI key-pair based identities.
  • Accountable Micro-Segmentation assuring you that all network assets and workloads are properly isolated, and reachable only by users who are not only authorized but who possess the PENs (private keys) accompanying those identity certificates, each of which carries an Identity Quality score.
  • CertAuth™ – Implementing certificate authentication throughout your network.
  • DSE™ – Digital Signatures Everywhere – assuring you that all events are digitally signed by the person responsible.
  • Logchain™ – A network log that resembles a blockchain, with all network events immutably recorded and signed





Security technology is not working. What are board members' responsibilities and liabilities for security breaches?  

As malware, ransomware, and phishing attacks proliferate, management tends to say "let's just try harder" instead of
considering architectures that, while effective, 
would be disruptive to their already busy lives.

They need to hear from you, their board member.

Security technology development has been based upon "Power Rangers" ideas, instead of the far more effective principle of accountability. A well-established solution to accountability has been hiding in plain sight for years. 
Learn what your organization can do to stop the breaches, ransomware, phishing attacks, malware, fraud, and
other totally avoidable challenges that characterize today's on-premise and cloud-based information infrastructures.




White Papers

HAVE Identities Before You MANAGE Them

Call it cloud computing, call it pervasive outsourcing and telecommuting – the fact is, things have changed. In many ways, your network replaces your buildings. A widely dispersed collection of people with whom you never rub shoulders are in there, looking at files and installing software.

You need to know with a reliable measure of certainty just who those people are.


Best Practices in the Use of Bloodletting and Security Technology

For centuries, every practicing physician was expected to know how much blood to drain from a patient at which stage of any ailment – until research demonstrated that bloodletting was useless and even harmful.

What does security technology have in common with bloodletting?  Find out in this white paper.