The recent Corona disaster has led to the rapid adoption of remote work and many companies and individuals are now using VPNs (Virtual Private Networks). With this growth has come an increase in VPN-related products and services, but these technologies have also been plagued by vulnerabilities and misconfigurations.
The commercialization of cyber-attacks and the commercialization of hacking tools and vulnerabilities (especially zero-day vulnerabilities) has also contributed to the increase in unauthorized access and ransomware attacks around the world.
Two major security measures have been implemented in companies so far: "terminal security" and "network security. However, as cyber attacks evolve, these measures need to be further strengthened.
These security measures are expected to be effective but not perfect, so it is important to stack them with other security measures. To address these threats, it is considered essential to meet the following four basic requirements of IT security
These must be implemented reliably not only at the traditional network perimeter security, but also between terminals handling data. To prevent the risk of data tampering by insiders, it is also important to clearly record who acquired and registered information and when, and to ensure that this record itself cannot be tampered with.
The Sees Blockchain Security System is a solution that can significantly reduce these risks.
Three types are available depending on the end-user environment and compliance.
Type | Single-board computer |
---|---|
Product name | Tinker Board 2S(Made by ASUS) |
SoC | Rockchip RK3399 64bit Dual-core Cortex-A72 2.0GHz Quad-core Cortex-A53 1.5GHz |
Memory | Dual-CH LPDDR4 4GB |
Storage | 32GB eMMC |
Power | ~45W |
Size | 85x56x20.7mm(90x65x32mm) |
Type | Single-board computer |
---|---|
Product name | Original |
SoC | Renesas RZ/G2L 64bit Dual-core Cortex-A55 1.2GHz Single-core Cortex-M33 200MH |
Memory | SDRAM DDR4 1GB |
Storage | 32GB eMMC |
Power | ~2.5W(Available with USB-TypeA) |
Size | 80x35x1.6mm |
The three product configurations meet all four security requirements of "information leak prevention," "tampering prevention," "stable operation," and "user authentication," and can be mixed and matched freely.
Many companies have not made progress in enhancing security in sharing data across the supply chain.
In such cases, simply installing a blockchain gateway terminal at the target company can mitigate security risks across the supply chain without the need for IT security personnel.
When working remotely, it is often necessary to work from home with critical data. Since you are using your home or an external network, security is not as tight as it is in a corporate setting, so the risk of unauthorized access is higher. With a blockchain transformer, you can protect your shared data with a blockchain by simply pointing a USB to your PC.
Seeds blockchain security is also effective for data on the manufacturing floor. Because it is via blockchain, data can be monitored and controlled from outside without being tampered with, even remotely. In addition, by uploading data from the factory to the cloud, it can be linked to a variety of other services.
Back to Top