Relevant Security Corp. Presents its Patented RPM™ Continuous Authentication Algorithm at Security B-Sides in Las Vegas

Share Article

Company provides RevSecure appliances to DEF CON 18 community to validate RPM technology.

Relevant Security Corp., a leading innovator and provider of their patented Real Privacy Management (RPM) algorithm for implementation of transaction level security between all devices in a communication, today announced that they are presenting the mathematics of the RPM technique at Security B-Sides in Las Vegas, NV.

“We are extremely pleased to be able to discuss this technique for transaction level security at B-Sides,” says Glenn Veach, Relevant Security Corp., CTO. “The B-Sides conference gives us an audience who truly understands the issues with implementing authentication technologies and provides us with feedback on how RPM can ensure network security by implementing transaction based authentication and security.”

As a follow up to presenting at Security B-Sides, there will be the opportunity for attendees at DEF CON 18 to test RPM enabled RevSecure appliances while they transfer data between one another. Relevant Security Corp. is awarding an IPAD to whomever can reveal the details of the secured data between the appliances by breaking the RPM method.

Relevant Security Corp. is using the patented Real Privacy Management (RPM) technology in OEM network communications equipment, with the Android mobile applications, and installed in virtual server environments. RPM has been demonstrated to improve performance over traditional authentication mechanisms, allowing RPM to authenticate transactions in near real-time.

About Relevant Security Corp.
Relevant Security Corp. provides technology (RPM) that offers continuous transaction authentication and security for data and electronic communications between all nodes on any network. RPM patented technology delivers true scalability by utilizing small code size and superior computational efficiency, which solves the performance and security issues associated with today’s current applications. RPM is small enough, fast enough and efficient enough to perform continuous mutual authentication and security of all transactions in near real-time on any device. For more information about the company and products go to


Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kirk Byles
Visit website