Existence Technologies


 Introducing a New Class of Internet activity

 

Understanding Why Cybersecurity Fails2

“If something is secure, only authorized people should have access.”

Access Control

Access to secure activity must only be granted to Authorized Users

identification

Identification is a critical skipped step in current authentication model

Authentication

An authorized user is granted access, identified then can authentication takes place

Security Protocols

The one thing every secure website has in common is missing security protocols.

Crowdfunding

For those Interested in becoming part of a more secure Internet

A Binary Solution

Computer Science is binary. There is always a binary solution to a binary problem.

A SAFER POINT OF VIEW


Removing public access to secure services exponentially decreases exposure.

1,700

Internet Connected Devices (in millions)

10,000

Authorized User

170,000

Potential Enemies to 1 Authorized User

The cybersecurity crisis

$1.5 Trillion in cyber damage in 2018, $4.1 Billion per day, $171.1 Million per hour, $2.9 Million per minute because indirect assertion of identity requires an assumption, a guess, as to who provided the data for authentication.

out of control damage

This is a 150% increase in cyber damage over 2017. Assuming the rate of damage does not increase, by 2023 the damage costs will be $146 Trillion. In an $80 Trillion world economy, this is a crisis.

Cybersecurity is a choice

The crisis is because of a perception that security is inconvenient. The “convenience over security” mantra, says it all. No one has ever tried to secure anything on the Internet. First, because it was not possible, now because…

Security protocol problem

So long as secure, classified and public activity is commingled and a guess for authentication is the basis for secure activity, cybersecurity is designed to fail. Limiting the damage is the goal.

Existence technology available

from our partner network


 

No partner information available at this time.