Cyber Security
BNS (Industrial BitNetSentry) provides a different approach to cybersecurity
- Enterprises
- Banking & finance
- Network operators
- Casinos
- Government
- Business tycoons
- Companies who follow the General Data Protection Regulation (GDPR)
- Airport & railway
- Multi-location companies
- SCADA
- Critical facilities
- IoT and Industrial equipment
BNS aims to solve four important business security pain points:
- Secure communication over public network
-
- Multi-location companies struggle to ensure guaranteed secure communication between branches while on the public network
- Current practice is to use VPN or IPSEC, which are insufficient because these tools become useless once the hacker gains access to the password or encryption keys
- Secure SCADA bi-directional communication
-
- SCADA systems face the challenge of been infiltrated by an external hacker or having faulty (and dangerous) commands sent due to human error
- Current practice is to use galvanic separation (e.g., physical demarcation) to prevent attacks or transmission of incorrect commands
- Galvanic separation is both expensive to deploy and maintain, and prevents useful communication from human-machine interface to critical infrastructure
- Protection of sensitive company data
-
- Companies struggle to protect against sensitive company data (e.g., customer personal information, intellectual property and financial information) from being modified or leaked out
- Current practice is to use firewalls and data-leakage prevention tools, which are visible to the hacker in the network and can be bypassed
- Thwarting of “rogue insiders”
-
- “Insider” can be defined as IT admin with system passwords, regular employee with access to company data, consultants and 3rd parties with system-level authorizations
- These “insiders” can go rogue and steal company info
- Current practice is to conduct background checks and apply AI tools to determine abnormal behavior patterns
- Background checks and AI tools do not capture all rogue behaviors, rendering the system vulnerable