SlideShare a Scribd company logo
Block Armour Secure Cloud Infrastructure and Services with
Blockchain-enabled Cybersecurity
Blockchain Technology
based Digital Identity
Locked-Down & Secured
Access to CloudSystems
Tamper-Proof Loggingof
Identity andAccess
2
49.2%
50.4%
50.0%
55.8%
61.1%
63.1%
63.1%
74.6%
0% 10% 20%
44.3%
30% 40% 50% 60% 70% 80%
Security
Performance
Availability
Hard to integrate with in-house IT
Not enough ability to customize
Worried on demand will cost more
Bringing back in house may be difficult
Regulatory requirements prohibit cloud
Not enough major suppliers yet
% responding 4 or 5
Cloud Computing Infrastructureand PlatformMarket
($ billions 2013-2018e)
Worldwide spending on Public Cloud Computing, 2015-
2020($B)
Gartnerpredictsthe worldwide public cloud servicesmarket will grow 18% in 2017 to $246.8Bup from
$209.2B in2016.
Source: Goldman Sachs Research, IDC, Gartner
12
16
21
28
35
4350
40
30
20
10
0
2013 2014 2015e 2016e 2017e 2018e
$67
$82
$99
$117
$138
$162
2015 2016 2017 2018 2019 2020
Challenges/Issuesascribed tothe‘cloud’/on-demand model (1=not significant, 5=very significant)
www.blockarmour.com
While enterprise Cloud adoption continues to mature and grow,
Security remains the industry’s topconcern
3 Given their strategic nature, Cloud infrastructure and services
have started to come under increasing attack
Business drivers for an
extended enterprise
ecosystem
Growing mobile workforce
Ever expanding enterprise
perimeter
Increased sophistication &
reduced cost of cyber-
attacks
Despite spending billions of dollars on Cloud security solutions, enterprises and service providers continue to defend against
tomorrows cyber attacks with yesterday’s technology
While business drivers justify a cloud-based extended enterprise ecosystem, the need to
secure the cloud resources that support it has grownmanifold
www.blockarmour.com
4 The Solution: Block Armour, a next-gen cybersecurity solution
for Cloud infrastructure, powered by Blockchain technology
Identity & Access
Validation Nodes
Identity & Access
Validation Nodes
The platform leverages digital signature based identity and authentication for humans, devices and
data; securely ring-fencing an organization’s cloud servers.
BlockArmour Enterprise
Security Ring
Admin
User
User
Block Armour delivers Blockchain Defined Perimeter (BDP), an enhanced Software-Defined Perimeter using private permissioned
Blockchain and TLS technology
B B
B
Cloud-based Servers
B
B
B
B
B
User
User
www.blockarmour.com
5
Harnessing Blockchain Defined Perimeter (BDP), Block Armour delivers a new breed of digital identity and access management
solutions. Smarter, faster and ready for tomorrow’s cyberattacks
Decentralization
Cryptographic
Encryption
Immutability
The Building Blocks: Block Armour is powered by Software
Defined Perimeter & BlockchainTechnology
Consensus-based
ControlDeveloped at the Defense Information Systems Agency
(DISA). Used by the DHS & DoD
SDP
Controller
1. Centralized Controller
4. List of authorized
Accepting Hostsdetermined
5. Acceptcommunication
from Initiating Host
Accepting
SDP Host
2. Mutual secure comm.
to Controller
Accepting
SDP Host
Control Channel
Data Channel
6. Receive list of IP’s
of AcceptingHosts
Initiating
SDP Host
3. Mutual secure comm.to
Controller
7. Mutual secure
comm.channels
SDP architecture enhanced with Blockchain & TLS Technology - offers opportunities to addressCloud
security challenges in bold new ways.
Software Defined Perimeter (SDP) Blockchain Technology
www.blockarmour.com
6
The platform also facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain
Block Armour’s Zero Trust setup allows for micro segmentation of
users, connected devices as well as Cloud-based infrastructure
www.blockarmour.com
7 The Result: Next-gen cybersecurity to protect your enterprise’s
most critical cloud based systems against evolving cyber threats
Its time you reclaimed cybersecurity and secured cloud servers / services using emerging technology!
Cryptographically-secure Digital Identity for users &devices
Invisible & Locked-Down CloudInfrastructure
Best-in-Class Encryption for Secured Access to Cloud Servers
Immutable & Tamper-Proof Logs stored Securely on the Blockchain
www.blockarmour.com
8 The core team building Block Armour has over four
decades of experience in Cybersecurity andManagement
We have created a highly skilled extended team that has over 100 years combined experience in the most relevant capabilities
needed for this venture.
Leadership Team
Narayan Neelakantan
Co-founder
Cybersecurity expert
Floyd DCosta
Co-founder, Strategy & GtM
Planning, Blockchain Tech
Abhijit D
Co-founder, CTO,
Cybersecurity expert
16 years experience 16 years international 10 years experience in
in infosecurity business experience. cybersecurity. SIM
Former Head of IT Risk Former Management Architecture. Insights
and Compliance and Consultant @Capgemini. @NSE, India.
CISO of India’s National VC and Blockchain Technology Security
Stock Exchange enthusiast
www.blockarmour.com
9 Learn how you can secure your Cloud Infrastructure and
Services using next gensecurity
Drop us a line or reach us via any of the channelsbelow:
+91 9820386446
+65 96536243
@blockarmour
info@blockarmour.com
www.blockarmour.com
Reach Us
www.blockarmour.com

More Related Content

PPTX
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
PPTX
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PDF
Solution: Block Armour Secure Remote Access for WFH
PDF
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
PDF
FIDO Authentication for Gaming Webinar
PDF
Google Case Study: Strong Authentication for Employees and Consumers
PDF
Introduction to the FIDO Alliance
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Ultra-Secure Private Cloud with Open Stack and Block Armour Zero Trust Cybers...
Next-generation Zero Trust Cybersecurity for the Space Age
Solution: Block Armour Secure Remote Access for WFH
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
FIDO Authentication for Gaming Webinar
Google Case Study: Strong Authentication for Employees and Consumers
Introduction to the FIDO Alliance

What's hot (19)

PDF
Google FIDO Authentication Case Study
PDF
The Industrial Immune System
PDF
FIDO Alliance Today: Status and News
PPTX
Authenticate 2021: Welcome Address
PPTX
Webinar: Securing IoT with FIDO Authentication
PPTX
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
PDF
Blcok Armour Digital Vault
PPTX
FIDO Masterclass
PPTX
Webinar: Catch Up with FIDO Plus AMA Session
PDF
FIDO Privacy Principles and Approach
PDF
Modern Authentication for a Connected World
PPTX
IDENTITY IN THE WORLD OF IOT
PPTX
Global Regulatory Landscape for Strong Authentication
PDF
FIDO and Adaptive Authentication
PDF
Google Case Study - Towards simpler, stronger authentication
PDF
FIDO Based Consumer Authentication
PPTX
FIDO Authentication: Unphishable MFA for All
PDF
Introduction to the FIDO Alliance
PPTX
2017 Predictions: Identity and Security
Google FIDO Authentication Case Study
The Industrial Immune System
FIDO Alliance Today: Status and News
Authenticate 2021: Welcome Address
Webinar: Securing IoT with FIDO Authentication
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Blcok Armour Digital Vault
FIDO Masterclass
Webinar: Catch Up with FIDO Plus AMA Session
FIDO Privacy Principles and Approach
Modern Authentication for a Connected World
IDENTITY IN THE WORLD OF IOT
Global Regulatory Landscape for Strong Authentication
FIDO and Adaptive Authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Based Consumer Authentication
FIDO Authentication: Unphishable MFA for All
Introduction to the FIDO Alliance
2017 Predictions: Identity and Security
Ad

Similar to Blockchain Defined Perimeter for Cloud Security (20)

PDF
Block Armour Brochure
PDF
Block Armour Brochure
PDF
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
PDF
Block Armour Overview Presentation
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PPTX
Block Armour Digital Vault
PPTX
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
PDF
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
PDF
Block Armour Blockchain Defined Perimeter Brochure
PDF
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
PDF
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
PPTX
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
PDF
Armor-Overview
PDF
Block Armour Zero Trust Cybersecurity Mesh for Telcom
PDF
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
PDF
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
PPTX
Ten Security Product Categories You've Probably Never Heard Of
PDF
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
PDF
Case study fortune 500 final
PDF
BlockChain Enabled-Cloud Delivered For Network Secuirty
Block Armour Brochure
Block Armour Brochure
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Block Armour Overview Presentation
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour Digital Vault
Zero Trust security for connected devices, critical IoT infrastructure and 5G...
Harnessing Blockchain technology for Cybersecurity (Smart City, Smart Nation)
Block Armour Blockchain Defined Perimeter Brochure
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Armor-Overview
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Ten Security Product Categories You've Probably Never Heard Of
IoT Armour: Securing connected devices and critical IoT infrastructure with B...
Case study fortune 500 final
BlockChain Enabled-Cloud Delivered For Network Secuirty
Ad

More from Block Armour (8)

PDF
Block Armour securing critical IoT infrastructure and 5g networks
PDF
Block Armour Zero Trust Cybersecurity for the Space Age
PDF
Block Armour Case Study
PPTX
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
PDF
Block Armour: Zero Trust Cybersecurity
PDF
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
PDF
IoT Armour: Blockchain-Enabled IoT Security
PDF
IoT Armour: the Solution
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour Zero Trust Cybersecurity for the Space Age
Block Armour Case Study
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
Block Armour: Zero Trust Cybersecurity
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
IoT Armour: Blockchain-Enabled IoT Security
IoT Armour: the Solution

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
A Presentation on Artificial Intelligence
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Blockchain Defined Perimeter for Cloud Security

  • 1. Block Armour Secure Cloud Infrastructure and Services with Blockchain-enabled Cybersecurity Blockchain Technology based Digital Identity Locked-Down & Secured Access to CloudSystems Tamper-Proof Loggingof Identity andAccess
  • 2. 2 49.2% 50.4% 50.0% 55.8% 61.1% 63.1% 63.1% 74.6% 0% 10% 20% 44.3% 30% 40% 50% 60% 70% 80% Security Performance Availability Hard to integrate with in-house IT Not enough ability to customize Worried on demand will cost more Bringing back in house may be difficult Regulatory requirements prohibit cloud Not enough major suppliers yet % responding 4 or 5 Cloud Computing Infrastructureand PlatformMarket ($ billions 2013-2018e) Worldwide spending on Public Cloud Computing, 2015- 2020($B) Gartnerpredictsthe worldwide public cloud servicesmarket will grow 18% in 2017 to $246.8Bup from $209.2B in2016. Source: Goldman Sachs Research, IDC, Gartner 12 16 21 28 35 4350 40 30 20 10 0 2013 2014 2015e 2016e 2017e 2018e $67 $82 $99 $117 $138 $162 2015 2016 2017 2018 2019 2020 Challenges/Issuesascribed tothe‘cloud’/on-demand model (1=not significant, 5=very significant) www.blockarmour.com While enterprise Cloud adoption continues to mature and grow, Security remains the industry’s topconcern
  • 3. 3 Given their strategic nature, Cloud infrastructure and services have started to come under increasing attack Business drivers for an extended enterprise ecosystem Growing mobile workforce Ever expanding enterprise perimeter Increased sophistication & reduced cost of cyber- attacks Despite spending billions of dollars on Cloud security solutions, enterprises and service providers continue to defend against tomorrows cyber attacks with yesterday’s technology While business drivers justify a cloud-based extended enterprise ecosystem, the need to secure the cloud resources that support it has grownmanifold www.blockarmour.com
  • 4. 4 The Solution: Block Armour, a next-gen cybersecurity solution for Cloud infrastructure, powered by Blockchain technology Identity & Access Validation Nodes Identity & Access Validation Nodes The platform leverages digital signature based identity and authentication for humans, devices and data; securely ring-fencing an organization’s cloud servers. BlockArmour Enterprise Security Ring Admin User User Block Armour delivers Blockchain Defined Perimeter (BDP), an enhanced Software-Defined Perimeter using private permissioned Blockchain and TLS technology B B B Cloud-based Servers B B B B B User User www.blockarmour.com
  • 5. 5 Harnessing Blockchain Defined Perimeter (BDP), Block Armour delivers a new breed of digital identity and access management solutions. Smarter, faster and ready for tomorrow’s cyberattacks Decentralization Cryptographic Encryption Immutability The Building Blocks: Block Armour is powered by Software Defined Perimeter & BlockchainTechnology Consensus-based ControlDeveloped at the Defense Information Systems Agency (DISA). Used by the DHS & DoD SDP Controller 1. Centralized Controller 4. List of authorized Accepting Hostsdetermined 5. Acceptcommunication from Initiating Host Accepting SDP Host 2. Mutual secure comm. to Controller Accepting SDP Host Control Channel Data Channel 6. Receive list of IP’s of AcceptingHosts Initiating SDP Host 3. Mutual secure comm.to Controller 7. Mutual secure comm.channels SDP architecture enhanced with Blockchain & TLS Technology - offers opportunities to addressCloud security challenges in bold new ways. Software Defined Perimeter (SDP) Blockchain Technology www.blockarmour.com
  • 6. 6 The platform also facilitates fine-grained resources’ access and comprehensive management of the policy engine on the Blockchain Block Armour’s Zero Trust setup allows for micro segmentation of users, connected devices as well as Cloud-based infrastructure www.blockarmour.com
  • 7. 7 The Result: Next-gen cybersecurity to protect your enterprise’s most critical cloud based systems against evolving cyber threats Its time you reclaimed cybersecurity and secured cloud servers / services using emerging technology! Cryptographically-secure Digital Identity for users &devices Invisible & Locked-Down CloudInfrastructure Best-in-Class Encryption for Secured Access to Cloud Servers Immutable & Tamper-Proof Logs stored Securely on the Blockchain www.blockarmour.com
  • 8. 8 The core team building Block Armour has over four decades of experience in Cybersecurity andManagement We have created a highly skilled extended team that has over 100 years combined experience in the most relevant capabilities needed for this venture. Leadership Team Narayan Neelakantan Co-founder Cybersecurity expert Floyd DCosta Co-founder, Strategy & GtM Planning, Blockchain Tech Abhijit D Co-founder, CTO, Cybersecurity expert 16 years experience 16 years international 10 years experience in in infosecurity business experience. cybersecurity. SIM Former Head of IT Risk Former Management Architecture. Insights and Compliance and Consultant @Capgemini. @NSE, India. CISO of India’s National VC and Blockchain Technology Security Stock Exchange enthusiast www.blockarmour.com
  • 9. 9 Learn how you can secure your Cloud Infrastructure and Services using next gensecurity Drop us a line or reach us via any of the channelsbelow: +91 9820386446 +65 96536243 @blockarmour info@blockarmour.com www.blockarmour.com Reach Us www.blockarmour.com