In the age of increasing communications between front-end devices, there are increasing opportunities for information to be hacked and compromised. These "Internet of Things", or IoT, devices were not designed for cybersecurity in mind. Cybersecurity traditionally is computationally expensive and therefore cost-prohibitive to place on these smaller, front-end devices that are supposed to be affordable
and accessible to the public.
The solution that IOTwitt has developed is a less computationally expensive hybrid cypher. This layered cypher requires less processing power to implement on low power devices, yet still retains a high level of security to protect sensitive data. It can be implemented in a device's hardware at assembly, or can be implemented as an add-on device that can interface with a desired piece of hardware. For example, a
phone could have this installed from day one, and all information coming to and from the phone would be secure from outside tampering. Another exam...
In the age of increasing communications between front-end devices, there are increasing opportunities for information to be hacked and compromised. These "Internet of Things", or IoT, devices were not designed for cybersecurity in mind. Cybersecurity traditionally is computationally expensive and therefore cost-prohibitive to place on these smaller, front-end devices that are supposed to be affordable
and accessible to the public.
The solution that IOTwitt has developed is a less computationally expensive hybrid cypher. This layered cypher requires less processing power to implement on low power devices, yet still retains a high level of security to protect sensitive data. It can be implemented in a device's hardware at assembly, or can be implemented as an add-on device that can interface with a desired piece of hardware. For example, a
phone could have this installed from day one, and all information coming to and from the phone would be secure from outside tampering. Another example is in something like the Amazon Echo. When you're ordering something on Amazon through the Echo, that information could be hacked to get access to login information and make fraudulent purchases. With the cypher, that login info is much more secure.

By securing communications in the front end devices, the security concerns for these military and public utility installations are significantly reduced. IOTwitt's hybrid cypher is securing data communication at the sensor level. This is a type of added security that allows for safer automation of processes.

This added security makes modernizing and automating systems much more attractive for military installations, or places, like banks, where security is of paramount performance. In addition, the low capital cost required to upgrade their facilities with our technology makes the proposals to upgrade much easier to authorize and enact.
More information

Investors

CyLon
Admin
CyLon We find, grow and invest in the world's best emerging cyber businesses
XLR8UH
Admin
XLR8UH One of the Top 30 Startup Accelerators in the US

Employees

meysam Asadi
Admin