Guardtime's Keyless Signature Infrastructure (KSI) technology allows networks to be instrumented in a way that digital assets and components can be tagged, tracked, and authenticated in real-time. KSI signatures are based on mathematical proofs rather than cryptographic secrets, provide evidence of an asset's provenance like time and identity, and are portable across networks. This allows networks using KSI to detect compromises early and build an integrity picture of the network in real-time. In contrast, traditional approaches like PKI rely on secrets that can be compromised and don't work as well at large scale. For example, the Target breach may have been prevented if they used KSI to monitor the integrity of components in their network.