Cyber Security

iBNS (Industrial BitNetSentry) provides a different approach to cybersecurity

  • Enterprises
  • Banking & finance
  • Network operators
  • Casinos
  • Government
  • Business tycoons

  • Companies who follow the General Data Protection Regulation (GDPR)
  • Airport & railway
  • Multi-location companies
  • SCADA
  • Critical facilities
  • IoT and Industrial equipment

iBNS aims to solve four important business security pain points:

  1. Secure communication over public network
    • Multi-location companies struggle to ensure guaranteed secure communication between branches while on the public network
    • Current practice is to use VPN or IPSEC, which are insufficient because these tools become useless once the hacker gains access to the password or encryption keys

 

  1. Secure SCADA bi-directional communication
    • SCADA systems face the challenge of been infiltrated by an external hacker or having faulty (and dangerous) commands sent due to human error
    • Current practice is to use galvanic separation (e.g., physical demarcation) to prevent attacks or transmission of incorrect commands
    • Galvanic separation is both expensive to deploy and maintain, and prevents useful communication from human-machine interface to critical infrastructure

 

  1. Protection of  sensitive company data
    • Companies struggle to protect against sensitive company data (e.g., customer personal information, intellectual property and financial information) from being modified or leaked out
    • Current practice is to use firewalls and data-leakage prevention tools, which are visible to the hacker in the network and can be bypassed

 

 

  1. Thwarting of “rogue insiders”
    • “Insider” can be defined as IT admin with system passwords, regular employee with access to company data, consultants and 3rd parties with system-level authorizations
    • These “insiders” can go rogue and steal company info
    • Current practice is to conduct background checks and apply AI tools to determine abnormal behavior patterns
    • Background checks and AI tools do not capture all rogue behaviors, rendering the system vulnerable