SlideShare une entreprise Scribd logo
1  sur  12
Kinamik Real-Time Data Integrity Assurance Mark Searle, CEO
Kinamik Offering ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],The Problem: Banking
[object Object],[object Object],The Problem: Cloud Computing ,[object Object]
Chapter 11, Example 5: “Erasing an Audit Trail” The Problem: Web Applications
“ I think tamper-resistant audits will become commonplace … good news, I stumbled onto a software company called Kinamik … dedicating [itself] to the creation of a tamper-resistant audit log!” The Kinamik Solution: Immutable Audit Data ,[object Object],[object Object],[object Object],Jeff Jonas IBM Distinguished Engineer and Chief Scientist, Entity Analytic Solutions, IBM Software Group
Alternative Approaches “ There are two distinct advantages to [Kinamik’s] method of log file security ... mathematical certainty that the contents have not been altered, … and chaining the data stream provides an immutable sequence of events.” - Securosis Approaches: Capabilities: Digital Signature File Hashing Time Stamping Write Once Read Many Integrity Assurance ✔ ✔ ✔ ✔ Real-Time Application ✔ Granular Detail ✔ ✔ (some) Event Sequencing ✔ ✔ Cost-Effective Scaling ✔ ✔
[object Object],[object Object],[object Object],[object Object],Going to Market:  “Old School” Business Model
 
Accessing Major Markets through Partners Regulatory Compliance Government Agencies Telecoms, ISPs & Utilities Litigation Support Non-repudiation Fraud Detection & Deterrence 2010-11 2011 Financial Svcs. & Healthcare 2011 2011
Team Mark Searle, CEO ,[object Object],[object Object],Carlos Saona, VP Technology ,[object Object],Carles Ferrer, Director ,[object Object],Al Sisto, Advisor ,[object Object],Andr é Marquis, Advisor ,[object Object],[object Object],Development Team ,[object Object],Business Team ,[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
Jon Neiditz
 
Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?
101 Blockchains
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
101 Blockchains
 

Tendances (20)

JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
 
MLSEV Virtual. Monitoring Low Risk Customers with ML
MLSEV Virtual. Monitoring Low Risk Customers with MLMLSEV Virtual. Monitoring Low Risk Customers with ML
MLSEV Virtual. Monitoring Low Risk Customers with ML
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?
 
HSB15 - 0xDUDE
HSB15 - 0xDUDEHSB15 - 0xDUDE
HSB15 - 0xDUDE
 
Top blockchain usage cases in the real world
Top blockchain usage cases in the real worldTop blockchain usage cases in the real world
Top blockchain usage cases in the real world
 
Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4web
 
What Are The Main Features Of Blockchain Technology?
What Are The Main Features Of Blockchain Technology?What Are The Main Features Of Blockchain Technology?
What Are The Main Features Of Blockchain Technology?
 
Top 5 real world applications of blockchain
Top 5 real world applications of blockchain Top 5 real world applications of blockchain
Top 5 real world applications of blockchain
 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
 
Where is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloudWhere is my big data: security, privacy and jurisdictions in the cloud
Where is my big data: security, privacy and jurisdictions in the cloud
 
Smart Contracts, Smarter Insurance: Blockhain - Tom Johansmeyer (2016)
Smart Contracts, Smarter Insurance: Blockhain - Tom Johansmeyer (2016)Smart Contracts, Smarter Insurance: Blockhain - Tom Johansmeyer (2016)
Smart Contracts, Smarter Insurance: Blockhain - Tom Johansmeyer (2016)
 
Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)Introduction to Blockchain-as-a-Service (BaaS)
Introduction to Blockchain-as-a-Service (BaaS)
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
Cannabis Technology
Cannabis TechnologyCannabis Technology
Cannabis Technology
 

En vedette

Wave Accounting Presents at Under the Radar
Wave Accounting Presents at Under the RadarWave Accounting Presents at Under the Radar
Wave Accounting Presents at Under the Radar
Dealmaker Media
 
Tagtile Presents at Under the Radar
Tagtile Presents at Under the RadarTagtile Presents at Under the Radar
Tagtile Presents at Under the Radar
Dealmaker Media
 
GoInstant Presents at Under the Radar
GoInstant Presents at Under the RadarGoInstant Presents at Under the Radar
GoInstant Presents at Under the Radar
Dealmaker Media
 
Salespod Presents at Under the Radar
Salespod Presents at Under the RadarSalespod Presents at Under the Radar
Salespod Presents at Under the Radar
Dealmaker Media
 
TribeHR Presents at Under the Radar
TribeHR Presents at Under the RadarTribeHR Presents at Under the Radar
TribeHR Presents at Under the Radar
Dealmaker Media
 

En vedette (9)

Marketo
MarketoMarketo
Marketo
 
Wave Accounting Presents at Under the Radar
Wave Accounting Presents at Under the RadarWave Accounting Presents at Under the Radar
Wave Accounting Presents at Under the Radar
 
Aha Utr V5
Aha Utr V5Aha Utr V5
Aha Utr V5
 
Delphix
DelphixDelphix
Delphix
 
Appfirst
AppfirstAppfirst
Appfirst
 
Tagtile Presents at Under the Radar
Tagtile Presents at Under the RadarTagtile Presents at Under the Radar
Tagtile Presents at Under the Radar
 
GoInstant Presents at Under the Radar
GoInstant Presents at Under the RadarGoInstant Presents at Under the Radar
GoInstant Presents at Under the Radar
 
Salespod Presents at Under the Radar
Salespod Presents at Under the RadarSalespod Presents at Under the Radar
Salespod Presents at Under the Radar
 
TribeHR Presents at Under the Radar
TribeHR Presents at Under the RadarTribeHR Presents at Under the Radar
TribeHR Presents at Under the Radar
 

Similaire à Kinamik

Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
MartinGuptil4
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
Bill Burns
 
Prepared_Comments
Prepared_CommentsPrepared_Comments
Prepared_Comments
finance40
 
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA UpdatesSecuring the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Mahbubul Alam
 

Similaire à Kinamik (20)

David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
 
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
Digital Asset Custody Services (DACS)_ Powering the booming smart-contracts m...
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Prepared_Comments
Prepared_CommentsPrepared_Comments
Prepared_Comments
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA UpdatesSecuring the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 

Plus de Dealmaker Media

Plus de Dealmaker Media (20)

Bitcasa
BitcasaBitcasa
Bitcasa
 
Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013Cloudant Presents at Under the Radar 2013
Cloudant Presents at Under the Radar 2013
 
SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013SiSense Presents at Under the Radar 2013
SiSense Presents at Under the Radar 2013
 
Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013Keen IO Presents at Under the Radar 2013
Keen IO Presents at Under the Radar 2013
 
Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013Continuuity Presents at Under the Radar 2013
Continuuity Presents at Under the Radar 2013
 
Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013Clustrix Presents at Under the Radar 2013
Clustrix Presents at Under the Radar 2013
 
SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013SwiftStack Presents at Under the Radar 2013
SwiftStack Presents at Under the Radar 2013
 
Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013Codenvy Presents at Under the Radar 2013
Codenvy Presents at Under the Radar 2013
 
Cedexis Presents at Under the Radar
Cedexis Presents at Under the RadarCedexis Presents at Under the Radar
Cedexis Presents at Under the Radar
 
Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013Catchpoint Presents at Under the Radar 2013
Catchpoint Presents at Under the Radar 2013
 
TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013TrueAbility Presents at Under the Radar 2013
TrueAbility Presents at Under the Radar 2013
 
BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013BetterCompany (formally happiily) Presents at Under the Radar 2013
BetterCompany (formally happiily) Presents at Under the Radar 2013
 
GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013GoodRevu Presents at Under the Radar 2013
GoodRevu Presents at Under the Radar 2013
 
Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013Entelo Presents at Under the Radar 2013
Entelo Presents at Under the Radar 2013
 
TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013TrackVia Presents at Under the Radar 2013
TrackVia Presents at Under the Radar 2013
 
Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013Sprint.ly Presents at Under the Radar 2013
Sprint.ly Presents at Under the Radar 2013
 
Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013Senexx Presents at Under the Radar 2013
Senexx Presents at Under the Radar 2013
 
Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013Allocadia Presents at Under the Radar 2013
Allocadia Presents at Under the Radar 2013
 
MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013MobileSpan Presents at Under the Radar 2013
MobileSpan Presents at Under the Radar 2013
 
MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013MobileSpaces Presents at Under the Radar 2013
MobileSpaces Presents at Under the Radar 2013
 

Kinamik

  • 1. Kinamik Real-Time Data Integrity Assurance Mark Searle, CEO
  • 2.
  • 3.
  • 4.
  • 5. Chapter 11, Example 5: “Erasing an Audit Trail” The Problem: Web Applications
  • 6.
  • 7. Alternative Approaches “ There are two distinct advantages to [Kinamik’s] method of log file security ... mathematical certainty that the contents have not been altered, … and chaining the data stream provides an immutable sequence of events.” - Securosis Approaches: Capabilities: Digital Signature File Hashing Time Stamping Write Once Read Many Integrity Assurance ✔ ✔ ✔ ✔ Real-Time Application ✔ Granular Detail ✔ ✔ (some) Event Sequencing ✔ ✔ Cost-Effective Scaling ✔ ✔
  • 8.
  • 9.  
  • 10. Accessing Major Markets through Partners Regulatory Compliance Government Agencies Telecoms, ISPs & Utilities Litigation Support Non-repudiation Fraud Detection & Deterrence 2010-11 2011 Financial Svcs. & Healthcare 2011 2011
  • 11.
  • 12.