Cybersecurity Mesh Adds Decentralized Security and Swarm AI for Remote Enterprises

Join executives from July 26-28 for Transform’s AI & Edge Week. Hear top leaders discuss topics around AL/ML technology, conversational AI, IVA, NLP, Edge and more. Reserve your free pass now!

Cybersecurity mesh has been named by Gartner as one of the top strategic technology trends for 2022. According to another report from Gartner, cybersecurity mesh is an advanced conceptual security architecture method that enables today’s distributed enterprises to extend and deploy security where it is needed most. .

David Carvalho, CEO and founder of cybersecurity network Naoris Protocol, told VentureBeat in an email interview that cybersecurity mesh is a flexible, configurable architecture that integrates widespread security services, enabling standalone security solutions to work together to improve overall security by bringing checkpoints closer to the assets they need to protect. He added that it can quickly and reliably verify identity, context, and policy compliance across cloud and non-cloud environments.

Cybersecurity mesh for Web3 decentralization

Carvalho noted that cybersecurity needs to be rethought and revamped, and that by 2025, the global cyber-damage problem will exceed $10 trillion. He further noted that, despite the annual increase in investment, cybersecurity still struggles to keep up with the endless arms race between defenders and attackers, with the cost of cyber disasters overshadowing any investment.

According to Gartner, the cost impact of individual security events would be reduced by an average of 90% by 2024 if organizations use a cybersecurity mesh architecture to integrate security products into a cooperative ecosystem.

In a press release, Naoris Protocol said it will provide decentralized and remote-first enterprises with decentralized cybersecurity mesh technology, which can mitigate attacks on all devices, networks and any type of institution, and provide a strong solution for any zero-trust architecture.

The company added that each validator in its mesh tracks and protects the value of the networks it covers using a decentralized proof of security (dPoSec) consensus method between peer-to-peer nodes in the network. Using a distributed consensus and cybersecurity mesh technology, threats can be quickly detected, preserving up to 90% of the value lost from a single cybersecurity incident.

Traditional centralized cybersecurity model

Currently, the underlying governance and ownership of cybersecurity solutions and tools is centralized, meaning the entity and technology are centrally owned and managed. It can no longer be trusted and has become a single point of failure for online attackers. Carvalho noted that every second, 127 gadgets are connected to the Internet for the first time.

According to a report, the total number of connected devices is expected to reach 50 billion this year. Despite this, Carvalho said organizations continue to use the standard cybersecurity techniques first introduced 40 years ago.

“Traditional centralized cybersecurity configures devices to work independently of each other, not in harmony, therefore each device becomes a single point of failure by default. This greatly increases complexity and response time, while increasing the attack surface, making devices easily exploitable by malicious actors,” added Carvalho.

However, Carvalho said Naoris Protocol is a complementary and decentralized protocol layer that solves the problem of centralized, untrusted network devices that do not have proper enforcement of standards.

Bringing in the Swarm

He said the company’s technology is restoring cybersecurity in every sector of the economy by transforming centralized and infamous devices, considered “single points of failure,” into cyber-trusted defense points that identify and mitigate threats, making networks stronger as they grow rather weaker. He added that distributed swarms of AI and blockchain technology are being used in conjunction with this design pattern to achieve higher levels of cybersecurity.

Naoris Protocol said in a press release that its decentralized mesh uses blockchain technology for trusted authentication and peer-to-peer architecture. It also mentioned that the NIST SP-207 Zero-Trust Architecture is compatible with software and hardware policies and enforcement due to its decentralized validator-based structure. The company said its blockchain offers a special way to record proof of trust with both confidentiality and verifiable integrity.

Carvalho also added that the Naoris protocol is unstoppable as it runs indefinitely. He said devices and networks can adopt it or leave it, but it cannot be stopped. He also noted that it doesn’t require permission because users and builders cannot be removed from the platform – it’s censorship-proof and open to everyone. He further noted that it is conceived as a public undertaking, yet extremely valuable to own and operate — creating an ecosystem around it. He also said creators can build on it because of the built-in incentives.

Carvalho said the invention of Naoris Protocol is a win/win solution for anyone who really takes advantage of a native Web3 decentralized capability to improve trust and security in a centralized world. He noted that Naoris Protocol is an additional layer of security that does not conflict with other traditional or centralized cyber tools.

Naoris Protocol, Carvalho said, stands out from other companies in this space because the company uses Web3 to fix Web2 (allowing Web3 to scale and Web2 to run securely). He noted that the current detection time for a reported breach averages 280 days and with the Naoris protocol less than 1 second under a distributed consensus trust architecture. According to Carvalho, over time the Naoris protocol will become a fully decentralized entity under a distributed user validation scheme, following hyperstructured principles.

The Naoris protocol is expected to go live by the end of 2022 with a minimum viable product (MVP). By mid-2023, the team expects to make the full product available to their customers, including banking, industry, critical civil infrastructure, healthcare organizations and national state organizations.

Naoris Protocol announced today that it has raised $11.5 million to scale its mesh-based decentralized validator structure and AI-based risk management solution. Funds were raised from notable technology investors such as Draper Associates (founded by Tim Draper), Holt Xchange, Holdun Opportunity Fund, Brendan Holt Dunn, Holdun Family Office, SDC Management, Expert Dojo, Uniera, Level One Robotics and multiple individual angels.

The mission of VentureBeat is a digital city square for tech decision makers to gain knowledge about transformative business technology and transactions. Learn more about membership.

Leave a Comment