Cybersecurity Policy
Xage Security Launches First Decentralized Cybersecurity Solution By IRINA SLAV
Xage Security, a California-based security and Internet of Things company, last month launched the first automated and decentralized, blockchain-backed cybersecurity product in the world aimed at helping businesses operating critical infrastructure secure this infrastructure and at the same time facilitate their compliance with new, tougher regulation.
Duncan Greatwood CEO, Xage Security
T
he Xage Policy Managerr will probably device networks using blockbe the start of a flurry of such solutions chain. It also integrates with Xage Policy Manager rity threats in amid growing cybersecurity existing network protecScreenshot industries that operate critical infration systems without structure as they the need to modify become increasthem. ingly digitized. This certainly Think oil and gas, sounds like somefor example, or thing these industries utilities, or transwill have growing port and logistics, need for as they find or manufacturing. themselves forced to All of these indusup their cybersecurity tries are going diggame. We’re talking ital at a breakneck about companies with pace to navigate hundreds of devices, intensifying comwith thousands of sopetition but with called distributed asdigitization come sets—from laptops more threats and and smartphones to this is not going voltage controllers in utilities—that utilities—th are normally exposed to cyberatto change anytime tacks. The winners winn in the cybersecurity war will be soon. This environthose who can offer a combination of easy-to-use, rement is fertile ground for liable, and flexible exibl solutions. security solutions such as h bleak bl the Xage Policy Manager. So, how is the future of cybersecurity and What does it do? Well, according to the company, it makes the Internet of Things? CyberAsia360 caught up with Xage life for critical infrastructure operators a lot easier by providing chief executive Duncan Greatwood for some insight. them with a single-dashboard solution that can automatically “It’s true that cyberattacks on IoT systems are a glaring replicate regulation-compliant security requirements across threat,” Greatwood says. “Security breaches on industrial con-
18
Issue: 004; December 2018