
Dive Into the New Age of a Secure Defense Fabric
The Fabric
BedRock - Secure Hypervisor/IOT Datastreams
BedRock provides a resilient secure foundation for microprocessor-based computing devices. BedRock Systems is on a mission to protect our nation's critical infrastructure to deliver a resilient secure trusted computing base from edge to cloud. When Information and/or Operational Technology systems are built upon BedRock, the operation is secured, innovation is unlocked, new services are launched, and revenue can grow.
-
Protect Critical Systems from Edge to Cloud – The Power to Prevent an Attack
-
Trusted Integration Framework Enables Secure Modernization
-
Zero Trust - Moving Beyond Least Privilege to Least Functionality
-
Virtualize to Isolate, Secure, and SwaP-C – Embedded systems, Aerospace, Weapon Systems, Robotics, Drones, UAV
Redwall mobile®
-
Redwall is built into the OS which allows active monitoring and control of all critical OS functions
-
Zero-day protection
-
Prevents root privilege
Secure Persona®
-
THE solution to BYOD
-
Optimal trade-off between security and usability for each use case
Digital Bodyguard®
-
Persona-specific trade-off between data protection and denial of service prevention
The OWL Intelligence Platform
-
Access any structured or unstructured, housed, remote data or third-party sources via API enabling data housed in various databases, applications, and formats easier to access, link, match, and score with any other dataset while providing the necessary tools for data visualization and analytics for decision making.
Whooster, operating within the OWL environment
-
Aggregate and analyzes vast amounts of data with advanced technology—quickly, efficiently, securely, and accurately. This powerful technology can turn fragmented open source and social media data into streamlined information, verify identities, locate people, and investigate—all while preventing fraud, waste, and abuse.
Secure:
-
Dual biometrics provides liveness and stronger security
-
Two sets of dual biometrics: selfie + signature and selfie + voice
-
FAR of ~1:2.7 million (Signature alone)
-
FaceID FAR is 1:1M, TouchID 1:50k
Portable:
-
Web-based system is easily embedded in any app/website
-
Works across devices and on any touchscreen device
-
Easy migration from desktop to mobile
-
Works worldwide and Asignio signature works across any language
User Experience Focused:
-
Very fast authentication (average less than 4 seconds)
-
Easy to onboard and easy to use
-
Only need to onboard once (unlike FIDO or device locked biometrics)

Zero Trust Methodology
"Trust no one, Verify everything
Six foundational pillars
In the Zero Trust model, all elements work together to provide end-to-end security. These six elements are the foundational pillars of the Zero Trust model:
·Identities may be users, services, or devices. When an identity attempts to access a resource, it must be verified with strong authentication, and follow least privilege access principles.
·Devices create a large attack surface as data flows from devices to on-premises workloads and the cloud. Monitoring devices for health and compliance is an important aspect of security.
·Applications are the way that data is consumed. This includes discovering all applications being used, sometimes called Shadow IT because not all applications are managed centrally. This pillar also includes managing permissions and access.
·Data should be classified, labeled, and encrypted based on its attributes. Security efforts are ultimately about protecting data, and ensuring it remains safe when it leaves devices, applications, infrastructure, and networks that the organization controls.
·Infrastructure, whether on-premises or cloud based, represents a threat vector. To improve security, you assess for version, configuration, and JIT access, and use telemetry to detect attacks and anomalies. This allows you to automatically block or flag risky behavior and take protective actions.
·Networks should be segmented, including deeper in-network micro segmentation. Also, real-time threat protection, end-to-end encryption, monitoring, and analytics should be employed.