Guardtime Announces GuardView Security Operations Center for Real-Time Data Loss Prevention of Intellectual Property

Share Article

Guardtime’s GuardView Security Operations Center solution combined with KSI™ instrumentation assures reliable, secure, and coherent security, safety, and business intelligence over critical enterprise assets and stops Intellectual Property leaving enterprise networks.

Guardtime announces GuardView Security Operations Center (SOC) solution that addresses the next-generation of Advanced Persistent Threats (APTs), malicious insiders, and enterprise integrity challenges. GuardView SOC protects organizations’ most precious commodity – their Intellectual Property. Leveraging Guardtime’s Keyless Signature Infrastructure (KSI™), GuardView SOC provides real-time Data Loss Prevention of all organizations critical assets.

Matt Johnson, CTO of Guardtime USA said, “Until KSI, trust was a myth and insiders could hide their tracks. To bring back trust in people and technologies, we have developed the GuardView Security Operations Center that comprehensively addresses the issue.”

“GuardView is the guarantee to protect your most precious commodity – your Intellectual Property,” Matt Johnson continued. “Real-time integrity validation afforded by the KSI technology means real-time detection and response to APTs, malicious insiders, and corrupt practices.”

GuardView SOC combines massive-scale big-data analytics with real-time I³ (Integrity Intelligence Insights) reporting. Guardtime KSI and I³ allows organizations to achieve truly mutually auditable networks, where auditors, users, and administrators actions can be verified by any 3rd party (or each other) without a reliance on costly identity management or cryptographic key systems. GuardView’s mutual auditability characteristics ensure complete accountability for user, administrator, system, and auditing activities. GuardView components also integrate into industry and government standard SIEM platforms. Never before has this level of integrity instrumentation been possible at the scale required for cloud, private enterprises, supervisory control, and content distribution systems.

Leveraging the I³ reporting, organizations can be assured of comprehensive end-to-end integrity for delivered services, assuring efficient carrier-grade operations and real-time response to APTs, malicious insiders, and integrity incidents. I³ artifacts detect Advanced Persistent Threats in real-time; with I³, Security Operations can achieve true real-time Data Loss Prevention and protection, while qualifying Service Level Agreements (SLAs) that guarantee the integrity of delivered assets.

The GuardView SOC is operated from a carrier-grade facility as a service, or can be privately deployed by those wishing to operate and manage their own I³ services as a service provider. The GuardView SOC is delivered as architecture, supported by Guardtime’s component stack, and staffed by expert trained and certified KSI security professionals.

About Guardtime

Guardtime brings transparency and accountability to digital society. Founded in 2007, Guardtime invented Keyless Signature Infrastructure (KSI) - a technology that allows any type of electronic activity to be independently verified using only formal mathematical methods, without the need for trusted administrators or cryptographic keys. Deployed by world governments, KSI provides real-time validation and an independent audit trail for everything that happens in digital society, limiting liability and making it impossible for insiders or sophisticated cyber attackers to manipulate data and cover their tracks. Read more at

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Martin Ruubel
+1 650 426 8771
Email >
Visit website