This webinar will explore:
•Reality checks of Private Blockchain implementations
•IAM a key security and foundation layer in Enterprise Blockchain implementations
•Options to protect private keys and crypto keys
•Ensuring data security and privacy between participating entities
With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology.
Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys.
Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes.
Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation.
Who should attend?
•Blockchain as a Service Providers
•Systems Integrators with Blockchain Practices
•Private Blockchain Platform Providers
•Healthcare Blockchain Providers
•IoT Blockchain Providers