Existence Technology starts with the most basic Security Protocol and applies it on the Internet:
“If something is secure, only authorized people should have access.”
Eliminates public access to secure services.
An authorized user is identified before portal access is granted
An authorized user to create and maintain a state-of-existence throughout a secure session
The one thing every secure website has in common is missing security protocols.
Existence technology is only available via authorized distributors.
Existence in the digital world provides a non-data factor for secure activity.
A SAFER POINT OF VIEW
Removing public access to secure services exponentially decreases exposure.
Internet Connected Devices (in millions)
Potential Enemies to 1 Authorized User
The cybersecurity crisis
$1.5 Trillion in cyber damage in 2018, $4.1 Billion per day, $171.1 Million per hour, $2.9 Million per minute because indirect assertion of identity requires an assumption, a guess, as to who provided the data for authentication.
out of control damage
This is a 150% increase in cyber damage over 2017. Assuming the rate of damage does not increase, by 2023 the damage costs will be $146 Trillion. In an $80 Trillion world economy, this is a crisis.
Cybersecurity is a choice
The crisis is because of a perception that security is inconvenient. The “convenience over security” mantra, says it all. No one has ever tried to secure anything on the Internet. First, because it was not possible, now because…
Security protocol problem
So long as secure, classified and public activity is commingled and a guess for authentication is the basis for secure activity, cybersecurity is designed to fail. Limiting the damage is the goal.
Existence technology available
from our partner network
No partner information available at this time.