Resiliant ID

ID document authentication

1. Blockchain-based, encrypted storage

2. AI system triangulates up to 12 separate biometrics

3. ID Verification scoring

4. GDPR compliant

Resiliant Trust Zone 

  • Hiding the infrastructure (e.g. cloaking the servers)
  • Authenticate 1st, connect 2nd
  • Micro-segmentation to apply the principle of the least privilege to the network
  • Dynamic & adaptive device authentication
  • No network location, replacing implicit trust with explicit identity-based trust

How it works

3 components :
SDP : Client installed on any end-user device (Desktop, tablet, smartphone…)
SDP controller: Device authentication, user’s access rights
SDP Gateway: enforces the rules, establishes access

The flow :
Control plane : what it’s hidden to the user
Data plane: User accesses the application
The control plane is the part of a network that controls how data is forwarded, while the data plane is the actual forwarding process

Resiliant Zero Trust E2E

Combination of Resiliant ID & Trust Zone

 

The Flow:

1. Device authentication with the controller using SPA

2. Controller gets the user’s name and access rights

3. User is asked to be verified by using biometrics (selfie)

4. User provides biometrics (takes a selfie)

5. Controller matches the biometrics with user’s ID document in the blockchain-based database

6. Controller informs the Gateway

7. Device is allowed to access the application

8. User performs data input in the application

Key Benefits

  • To be able to manage the 2020-2021, and counting, dramatic increase (1148%) in number of employees working from home.
  • Allows the highest level of security no matter what the user device is: PC, laptop, tablet, Smartphone and form Windows, Mac to Linux and for Android and IOS.
  • Single security construct across hybrid architectures: by allowing for user access entitlements and policies to work across our data centers and cloud environments
  • Verify Identity on the fly, accesses are conditional and based on User ID, Device and context
  • Offload user traffic from backhaul connections, with the ZERO trust gateways sit at the edge of workloads, eliminating the need to connect multiple environments through site-to-site VPNs so users can traverse into them.
  • Immediate accelerated digital transformation initiatives
  • Secure immediately Web based, Non-web and legacy app by reducing Attack surface
  • Prevent issue propagation by eliminating visibility and access to unauthorized resources.
  • Minimized time to provision users and number of staff to support provisioning; less trouble tickets and security incidents; shorter login times; and easier handling of many concurrent users