Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Paradigm-Changing Cybersecurity Firm StealthPath Joins the Industrial Internet Consortium

StealthPath Inc. an endpoint-first security firm announced they have b************** of the Industrial Internet Consortium (IIC™), now incorporating OpenFog Reference Architecture. “Our solution is closely aligned with the IIC focus,” says StealthPath President Russ Berkoff. “We’re bringing a new approach to protecting Internet-connected devices, enabling true zero trust at the speed of operations.”

Where leading security approaches work from the perimeter in, protecting devices and communications by hardening the network, StealthPath’s innovation is to work from the inside out. It is provisioned on individual devices, monitoring, alerting, or filtering communications down to the individual instruction level. With extreme granularity, it can intervene precisely, blocking anomalous or malicious commands. It does not matter whether the source is malware, user error, or system malfunction, StealthPath works with extreme speed, without interfering with highly time-sensitive processes. An incremental three-stage deployment model allows customers to evolve their level of adoption, providing low-impact entry to accounts with significant potential for expansion.

Read More: Affectiva’s Latest $26 Million to Drive the Integration of Emotional Intelligence AI in Safety Systems of Automobiles

“Cybersecurity is extremely important aspect of the IIoT,” said Dr. Richard Soley, Executive Director, IIC. “We are delighted to have StealthPath as a member of the IIC to share its unique knowledge and experience about cybersecurity with our members.”

Related Posts
1 of 40,645

The approach is transformative without being disruptive, a complement rather than a competitor to current information security solution. Because it functions at the device level, it can be effectively implemented even in already compromised environments. Which, given the ubiquity of malicious advanced persistent threats, may well be all of them.

Read More: World’s Largest Business Organization Partners with Perlin for Blockchain Adoption Across Its 45 Million Members

StealthPath offers a significant immediate benefit to the IIoT, where previously air-gapped solutions have gained significant advantages in data analysis and convenience at the cost of a dramatically expanded threat surface. Membership in the IIC promises to allow the company to continue to evolve its offerings in response to broader, real-world feedback from other innovators in one of the most dynamic, and promising areas of information technology transformation.

“We see ourselves as the last line of defense,” says former Special Forces Officer Berkoff, “Purpose-built to disarm and neutralize cyber-exploits that manage to get through every other layer of protection in an OT environment.” StealthPath has filed, and received preliminary approval on 18 patents to globally secure their potentially game-changing IP.

Read More: NASA TV Coverage Set for April 17 Cygnus Launch to International Space Station

1 Comment
  1. Copper slag recycling says

    Copper scrap processing technology Environmental benefits of Copper scrap recycling Metal recycling and salvage
    Copper cable industry, Metal reclaiming and repurposing, Copper scrap baling and shredding

Leave A Reply

Your email address will not be published.