"Information leakage prevention" "Tampering prevention" "Stable operation" "User authentication"
The system meets all four security requirements!

Sees Blockchain
Security System

For data sharing between supply chains!
For enhanced security when working remotely or traveling!
Enables data export from the factory!

Reasons for Increased Cyber Attacks and Security Trends

The recent Corona disaster has led to the rapid adoption of remote work and many companies and individuals are now using VPNs (Virtual Private Networks). With this growth has come an increase in VPN-related products and services, but these technologies have also been plagued by vulnerabilities and misconfigurations.
The commercialization of cyber-attacks and the commercialization of hacking tools and vulnerabilities (especially zero-day vulnerabilities) has also contributed to the increase in unauthorized access and ransomware attacks around the world.
Two major security measures have been implemented in companies so far: "terminal security" and "network security. However, as cyber attacks evolve, these measures need to be further strengthened.

These security measures are expected to be effective but not perfect, so it is important to stack them with other security measures. To address these threats, it is considered essential to meet the following four basic requirements of IT security

Information leakage prevention
Confidentiality
Only users and systems with legitimate permissions should be able to access data in the cloud to prevent unauthorized access or disclosure.
Tampering prevention
Integrity
Data stored in the cloud must not be tampered with and the exact same data must be shared from sender to receiver.
Stable
operation
Availability
Stable access to cloud services and data should be maintained when needed and be able to respond quickly in the event of a failure.
User authentication
Authentication
The ability to verify that the person to whom data is exchanged in the cloud is a legitimate user or system.

These must be implemented reliably not only at the traditional network perimeter security, but also between terminals handling data. To prevent the risk of data tampering by insiders, it is also important to clearly record who acquired and registered information and when, and to ensure that this record itself cannot be tampered with.

The Sees Blockchain Security System is a solution that can significantly reduce these risks.

What is the Sees Blockchain Security System?

Three types are available depending on the end-user environment and compliance.

Blockchain Gateway
Type Single-board computer
Product name Tinker Board 2S(Made by ASUS)
SoC Rockchip RK3399 64bit
Dual-core Cortex-A72 2.0GHz
Quad-core Cortex-A53 1.5GHz
Memory Dual-CH LPDDR4 4GB
Storage 32GB eMMC
Power ~45W
Size 85x56x20.7mm(90x65x32mm)
Blockchain Transformer
Type Single-board computer
Product name Original
SoC Renesas RZ/G2L 64bit
Dual-core Cortex-A55 1.2GHz
Single-core Cortex-M33 200MH
Memory SDRAM DDR4 1GB
Storage 32GB eMMC
Power ~2.5W(Available with USB-TypeA)
Size 80x35x1.6mm

The three product configurations meet all four security requirements of "information leak prevention," "tampering prevention," "stable operation," and "user authentication," and can be mixed and matched freely.

USE CASE

CASE 01

Data sharing across the supply chain

Many companies have not made progress in enhancing security in sharing data across the supply chain.
In such cases, simply installing a blockchain gateway terminal at the target company can mitigate security risks across the supply chain without the need for IT security personnel.

CASE 02

Enhanced security for remote and business travel

When working remotely, it is often necessary to work from home with critical data. Since you are using your home or an external network, security is not as tight as it is in a corporate setting, so the risk of unauthorized access is higher. With a blockchain transformer, you can protect your shared data with a blockchain by simply pointing a USB to your PC.

CASE 03

Data export from factory

Seeds blockchain security is also effective for data on the manufacturing floor. Because it is via blockchain, data can be monitored and controlled from outside without being tampered with, even remotely. In addition, by uploading data from the factory to the cloud, it can be linked to a variety of other services.

Back to Top