TECHNOLOGIES



You have found 8 search results

As enterprises continuously digitize their businesses, there is an increasing need for security and trust built around digital identities. Current identification systems are siloed and enterprises are having major challenges to manage Personal Identifiable Information (PII) in an increasingly regulated environment (eg. General Data Protection Regulation, GDPR). On top of that, privacy and control of their data are becoming a greater concern for users as well. We provide a blockchain technology t...

Booth 5E05 - Dragonchain

We are providing Security As A Service (SecaaS) based on a proven solution that applies global standards of cloud cryptographic techniques and global PKI digital signature technical standards defined by Cloud Signature Consortium (CSC). The company leads global cloud security service standards in the country as it is currently the only member of CSC in the country. While the initial investment is on-premise installation, No-plugin is now an issue. Trends suggest that the Cloud Security Alliance...

Booth 4K37 - CrossCert

Digital identity is a cornerstone of every modern internet application. Today, organizations in both the public and private sectors deploy their own identity management systems with their own means of establishing, verifying, storing and managing the lifecycle of digital identity on the internet without a common standard. In a world where increasing economic activity and trade is taking place digitally, the siloed systems of digital identities are a clear concern in privacy and security, and is ...

Booth 5E05 - Vaulut

We are helping cyber insurers to write policies at the right price using data-driven cyber risk insights derived directly from policyholder devices. Cybercrime is rising rapidly and cyber risks are constantly mutating. Unsurprisingly, corporates are seeking increased insurance cover, and the huge cyber insurance market is growing rapidly. But cyber insurers lack the fundamental data they need to price their risk exposure properly. Not only is there a dearth of historical data, but cyber insurer...

Booth 4L11 - InsurTechnix Limited

The technical problems that this technology provides a solution for are: communication and storage scalability, fairness and consistency. By communication scalability, we mean an efficient imposed communication overhead to the system for generating a single transaction or block. By storage scalability, we mean an efficient storage overhead on the participating nodes of the blockchain protocol. By fairness, we mean the uniform chance of the participating nodes in block generation decision making ...

Booth 5K08 - Koç University

Most commonly used pseudo random number generators that generate random numbers by defined formulas are exposed to hacking when patterns or cycles are identified and are no longer safe to use for encryption and authentication. The micro quantum random number generator (QRNG) that we offer is a microchip product that generates encryption keys and digital signature codes by creating random numbers that is impossible to predict. In addition, this technology is widely applicable, so it can be mounte...

Booth 4ZJ10 - EYL, Inc.

Trusted Application Kit (T.A.K) secured mobile apps diagnose and protect themselves at runtime with our next-generation technology. T.A.K delivers valuable insights to service providers so that they can react on upcoming threats and fraud in real-time. To the end-user of your apps, T.A.K remains invisible and non-intrusive, yet it gives your users a high level of trust and security.  T.A.K is an SDK for Android and iOS that allows quick and easy development of highly secured and protected mobil...

Booth 4M17 - Build38

Our FIDO based biometric authentication covers 550+ million transactions every month and is still mounting. This shows that the market has acknowledged the excellence of our biometric authentication service, as it has been adopted in numerous domains (e.g. finance, online education, credit ratings, Fintech). Our technology officially obtained FIDO 1.0 & FIDO2 certificates that follow standards FIDO Alliance defines: Our technology supports FIDO solution based biometric authentication method i...

Booth 4K37 - CrossCert

Services & Digital Economy