Challenges and Myths of Enterprise Blockchain

Logo
Presented by

Rao Cherukuri, CTO and James Penney, Director, Product Management

About this talk

This webinar will explore: •Reality checks of Private Blockchain implementations •IAM a key security and foundation layer in Enterprise Blockchain implementations •Options to protect private keys and crypto keys •Ensuring data security and privacy between participating entities With the hype and popularity of crypto currencies, there has been tremendous publicity about Blockchain, the distributed ledger technology and its use cases. The hype around blockchain is growing with the vast majority of Enterprises saying they are “actively involved” in the technology. Blockchain relies heavily on Public Key cryptography, but it doesn’t have a defined security model to secure the participating nodes and associated private keys. Enterprise private blockchain operations are substantially different, often utilize a permissioned network in which consensus can be achieved through a process called “selective endorsement,” where authorized peers verify the transactions. The advantage of this for businesses is that only participants with the appropriate access and permissions can maintain the transaction ledger. This calls for traditional Enterprise IAM (Identity and Access Management) methodologies to be extended to participating nodes. Device Authority specializes in device centric IAM with a focus on automated PKI and security management functions for entities and data. Our KeyScaler platform delivers the entity and data trust at scale for any Enterprise Blockchain implementation. Who should attend? •Blockchain as a Service Providers •Systems Integrators with Blockchain Practices •Private Blockchain Platform Providers •Healthcare Blockchain Providers •IoT Blockchain Providers
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (82)
Subscribers (5421)
Device Authority provides solutions to address the challenges of Identity and Access Management for the Internet of Things (IoT) without human intervention. We help our customers and partners simplify the process of establishing trust for the IoT, enabling end-to-end security architecture and scale for the IoT through our innovative technology platform: KeyScaler. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the physical consequences of compromised security. These challenges cannot be effectively addressed by traditional Information Technology (IT) security solutions. KeyScaler is purpose-built to address these challenges through automated device provisioning, authentication, credential management, policy based end-to-end data security/encryption and secure updates.