Sixgill, LLC has unveiled its breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, transmitted data, ingested data, and acted-upon data are the same.

Sixgill is taking a fresh approach to fundamental industry challenges of data security and authenticity:

- Cloud processing multiplies intrusion vulnerabilities in complex networks. Proliferation of connected devices can vastly expand system surface area for attack opportunities. And hardware vulnerabilities such as Meltdown and Spectre compound cloud systems' susceptibility to intrusion and malfunction. Distributed Ledger Technology can protect data when security fails.

- Sensor data streams can be tampered with, hacked or changed without an organization ever knowing, or not knowing soon enough to prevent serious error. The immutable nature of Distributed Ledger Technology (DLT) can be applied to ensure information integrity, veracity and auditability.

- Until now, blockchain foundations have been too slow and encumbered to achieve critical, real-time operations performance. Sixgill Integrity applies a hybrid architecture to combine the immutability of DLT with the high performance of modern, distributed database technologies.

As the volume and velocity of sensor data traversing complex networks exponentially grows, system vulnerabilities become increasingly consequential. Current and future automated sensor data networks face potentially disastrous malfunctions, if transmitted data is compromised and wrongly trusted. Already, Thales reports that 71% of enterprises are now gathering data for IoT initiatives while security remains a major concern and impediment to their IoT deployments.

The thesis behind Sixgill Integrity is that security is an illusion and despite best efforts, bad actors can and likely will eventually intrude in any system. If the cat- and-mouse game of security cannot be conclusively won, Sixgill asserts that sensor data itself is defensible. Further, a propensity for data silos in the enterprise necessitates an increasing number of middlemen and brokers, creating more fissures for intrusion.

Security vendors should keep trying to deny access to bad actors, but Sixgill will presume failure and...

To continue reading