
Integrity is built with a public on-chain, and distributed off-chain, hybrid architecture. Singh as Presidentīy uniquely combining DLT and edge computing (where possible), Sense Integrity uses blockchain and cryptography to provide authenticity of data origin and verification of data content and chronology. Read More: Palo Alto Networks Appoints Amit K.

Integrity for data includes not only the data itself, but also assuring authentic sequencing of time-series data that predominates in sensor-informed processes. Security vendors should keep trying to deny access to bad actors, but Sixgill will presume failure and focus on assuring the intactness of data streams, and on immediately exposing any successful compromises so people and automated systems do not act on inauthentic data. Further, a propensity for data silos in the enterprise necessitates an increasing number of middlemen and brokers, creating more fissures for intrusion. If the cat-and-mouse game of security cannot be conclusively won, Sixgill asserts that sensor data itself is defensible. The thesis behind Sixgill Integrity is that security is an illusion and despite best efforts, bad actors can and likely will eventually intrude in any system. Security is an Illusion Data is Defensible Read More: Interview with Ben Goertzel, CEO at SingularityNET Already, Thales reports that 71% of enterprises are now gathering data for IoT initiatives while security remains a major concern and impediment to their IoT deployments. Current and future automated sensor data networks face potentially disastrous malfunctions, if transmitted data is compromised and wrongly trusted. Read More: Calabrio Delivers Powerful Enterprise Scalability and Management CapabilitiesĪs the volume and velocity of sensor data traversing complex networks exponentially grows, system vulnerabilities become increasingly consequential. Sixgill Integrity applies a hybrid architecture to combine the immutability of DLT with the high performance of modern, distributed database technologies.

And hardware vulnerabilities such as Meltdown and Spectre compound cloud systems’ susceptibility to intrusion and malfunction. Proliferation of connected devices can vastly expand system surface area for attack opportunities. Cloud processing multiplies intrusion vulnerabilities in complex networks.Sixgill is taking a fresh approach to fundamental industry challenges of data security and authenticity: With Integrity, organizations are assured that their emitted data, transmitted data, ingested data, and acted-upon data are the same. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. Sixgill, LLC, the leader in sensor data services for governing Internet of Everything (IoE) assets, unveiled its breakthrough blockchain or distributed ledger-based solution for sensor network data integrity.
