AN ALTERNATE WAY OF THINKING – NARROWING THE PLAYING FIELD AND CREATING A SHARED ECONOMY THROUGH ALLIES AND MODERN FINANCE
New cyber measures must stand against increased complexity and sophistication. Attackers are now backed by “State” resources and could compromise every system, endpoint, device and their associated applications.
Silicon Mountains’ solution is to provide fast technology evaluation and onboarding via sharing models such a cloud environment, where functionalities are tested and validated by thousands of users and experts. We implement a cyber security system that combines state of the art software with vendor management, inventory controls, personnel and mission management as well as financing alternatives for inventory. We employ our proprietary software as an overlay that channels vulnerabilities along a known path by:
- creating a comprehensive inventory system of all institutional equipment, whether internet-connected “household items”, complex equipment and devices, or sophisticated technology platform;
- utilizing appropriate protection measures, such as big data algorithms and cloud resources to canvass all internet-connected devices in the inventory for anomalies;
- CRAM – Cyber Resilient IT Asset Management™ (Patent Pending); and,
- facilitating access to lease/purchase options and differing financing and joint venture opportunities to lower the cost of securing and maintaining needed devices to provide continuity and increase the scope of cyber protective measures;
The Silicon Mountains’ approach is to significantly narrow the playing field so that intruders are playing within our rule book rather than theirs. By changing the playing field in which cyber protection is approached, our clients are better positioned to confront the unknown.
In addition, Silicon Mountains is extending its research to cover some of the most vulnerable targets in any complex environment — “household items” such as microwaves, vending machines, thermostats and miscellaneous identity access cards. These internet connected devices are not generally protected with anti-virus software and users are not obligated to update logins and passwords. Hackers can and do cloak malware and gain access or control to the overall technology platform through these household items with little to no resistance. We anticipate that the next generation of CRAM™ will meet these challenges.