WHILE BOTH USER-CONTROLLED DEVICES AND IOT DEVICES WILL BENEFIT, TRUSTCENTRAL’S CURRENT FOCUS IS ON USER-CONTROLLED DEVICES
THE PROBLEM FOR USER-CONTROLLED DEVICES
Secure communication exchanges and the authentication of trustworthy data from and between users and/or devices operating outside of a network can be problematic, despite currently available resources. It is difficult to reliably control external users and/or devices and provide them with clear and secure instructions for authorizing destinations, the use of encryption, related controls, etc. for their activities within and from hostile environments external to the enterprise or into the enterprise.
Protecting enterprise and external users as well as devices from spoofing attacks is a further challenge that current systems all too often handle inadequately. It is challenging to deliver a solution enabling the reliable and secure sharing of sensitive data while also incorporating the beneficial features of user-friendly cryptographic tools.
THE SOLUTION FOR USER-CONTROLLED DEVICES
TrustCentral offers consulting and a security ecosystem with multiple patented components. This secure technology is built upon longstanding, widely adopted worldwide cryptographic standards that are well trusted. The TrustCentral Software Engine provides flexible solutions built upon patented Certificate-Enforced Relationships (CER’s) between remote endpoints. Certificate-Enforced Relationships are built upon the authentication of paired endpoint relationships (whether user-controlled or user-less endpoints), combined with the authorization of defined rules and business logic when using that Certificate-Enforced Relationship.
TECHNOLOGY AND THE SOFTWARE ENGINE
TrustCentral’s core technology is encapsulated in its Software Engine. This incorporates TC’s patented Certificate-Enforced Relationships which provide configurable CER Use Rules and Business Logic. CER’s are established using TC’s proprietary Inviter-Invitee Protocol. The TC Software Engine also creates: Secure Groups and Subgroups; device-level Encryption; Digital Signing; Certificate-Enforced Whitelisting and more. TC by design inherently aligns with and supports zero-trust principles. The TC Software Engine is the key component that delivers the “TC Magic” across all TC’s markets.
TC will be valuable to private and public enterprises, military, medical, research, legal, IoT, smart cities and users operating in hostile environments.
FOR IOT MARKETS
SECURITY AND MANAGEMENT OF IOT DEVICES OUTSIDE OF AN ENTERPRISE’S NETWORK