Promote this Nomination
|Company (that provides the nominated product / solution / service)||CryptoMove|
|Company size (employees)||1-25|
|Type of solution||Software|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
CryptoMove is a groundbreaking and innovative approach to encryption that leverages dynamic movement, distribution, mutation, and re-encryption. IoT environments are incredibly difficult to secure because conventional methods of prevention and detection don’t scale. IoT environments are highly distributed and in untrusted networks. Traditional IoT security is vulnerable to attacks that steal cipher text, steal keys, study encryption systems, destroy encrypted data, or ransomware data, to which encryption offers zero protection. Further, an attack on data in IoT environments risks not just stealing of secrets, but physical destruction and danger. CryptoMove's innovative approach makes data a constantly shifting and moving target. Further, CryptoMove is the best way to securely store and manage data in highly distributed IoT environments, due to its natural resiliency and redundancy. CryptoMove integrates in edge/fog computing nodes, or even in devices like Raspberry Pi’s, connected cars, or drones. CryptoMove thus uniquely increases security and resiliency, reduces defender workloads, and increases costs and frustrates cyber-adversaries.
CryptoMove is backed and advised by top investors and security industry leaders, including Tim Draper and Draper Associates venture capital firm, as well as early investors, founders, and executives from Palo Alto Networks, FireEye, Palantir, Facebook, Cyphort, Cisco, Juniper, and others.
CryptoMove has a top team that has been on the ground floor of multiple successful enterprise and security startups, has invented distributed programming languages, built next-generation military moving target defense security systems, and has enforced data protection and cybercrime for Fortune 500 technology giants.
Summary of Achievements
CryptoMove is a new active defense data protection startup in Silicon Valley. CryptoMove’s innovative security approach protects data in edge, fog, and IoT environments with dynamic movement, distribution, mutation, and re-encryption.
Data in IoT environments is static and unchanging, easy for adversaries to hide, study, and plan attacks at their leisure. Attackers have asymmetric advantages and steal clear text, ciphertext, encryption keys, mount cryptographic attacks, destroy data, ransomware data, or corrupt data’s integrity.
The major IoT security problem is traditional prevention and detection methods have no hope of scaling. These digital equivalents of locks, cameras, traps, walls, and security guards fail. Attackers break locks, turn invisible to evade cameras, discover traps, go over/under walls, and there are simply not enough guards to keep up. To make matters worse, quantum computers threaten to unravel current encryption in a Y2K-style event. IoT environments like smart factories & cities, connected cars, drones, or sensors are highly distributed and in untrusted networks.
CryptoMove’s innovative approach makes data a constantly shifting and moving target. Attackers cannot identify data to mount attacks. Time is a disadvantage, because data is constantly moving, fragmenting, and mutating. And if attackers manage to identify, steal, or destroy data, all they have are worthless encrypted fragments. CryptoMove’s system distributes copies automatically for resiliency and redundancy, and is resilient to attack and failure. Quantum computers don’t matter, because attackers can’t collect encrypted data to brute force.
CryptoMove integrates in any edge/fog device and provides end-to-end protection from IoT to cloud. It installs on Raspberry Pi, Drones, connected cars, or other IoT devices. Conventional detection/prevention increases defenders’ work and heightens adversaries’ asymmetric advantages. CryptoMove’s active defense data protection, however, increases attacker costs while reducing defenders’ workloads. This flips the asymmetry — in favor of defense.