Materials introducing Guardtime’s and its Partner’s solutions utilizing KSI technology.
The whitepaper identifies a number of use cases based on global market research. The list is driven by emerging trends in the financial, insurance, logistics, telecommunication and IT industries. The use cases apply to all insurance-based organizations, banks, aggregators, telecommunication companies and software vendors.
In-depth materials discussing the business impact of unreliable, unverified electronic data and how Guardtime Keyless Signature technologies can contribute to solving the problem.
A Network World Article: Enhanced trust and data integrity for the public cloud (.pdf, 0.6 MB)
Abstract: Now there is a new solution that builds keyless signatures into the public cloud infrastructure to provide enhanced trust and integrity. The solution is jointly delivered by data integrity provider Guardtime and cloud computing provider Joyent. The companies’ partnership enables enterprises to safeguard their most valuable assets in the Cloud: code, logs and data. The solution delivers completely auditable and forensic-quality logs and proof of data integrity for stored or archived data. In addition, it can prevent unauthorized applications from running.
Abstract: This paper examines a technology that can provide massively-scalable authentication of all digital documents and information with which organizations rely on. Using a unique keyless signature approach, the technology enables solutions that deliver mathematically-provable and tamper-evident audit trails for all electronic data, regardless of origin, size, location, and destination.
A Joyent and Guardtime Whitepaper: Achieving Integrity in the Cloud (.pdf, 0.7 MB)
Abstract: As a response to the increasing trend of cloud computing adoption, the paper is designed to present the overall concept of cloud computing, where businesses use the technology, the problems and challenges it introduces, what it means to have a secure cloud, and what organizations must consider as they move more of their mission-critical business processes to environments other than the traditional internal, walled-garden infrastructure. At the end of the day, it all boils down to the ability to securely deliver business services to the lines of business as they need them, using what is fundamentally, today, an untrusted infrastructure.
A Frost and Sullivan Whitepaper: 2010 Asia Pacific New Product Innovation (.pdf, 0.4 MB)
Abstract: Customers and organizations could gain a multitude of benefits by utilizing the Guardtime solution. Firstly, customers could avoid the skyrocketing investments in setting up an in-house security infrastructure. Secondly, the solution could aid organizations to address scalability concerns. In addition, the solution could further bolster the organizations reputation in assuring data governance and integrity.