A patent application, at the foundation of our technology, has been granted in one of our largest target markets, China. This is the core technology that enabled BankVault to pioneer a new category within cybersecurity, that Gartner termed Remote Isolation (aka Remote Internet or Remote Browsing).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
Futureproof Computing – Built in Seconds<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
When Amazon Web Services (AWS) takes 40-minutes to build and deploy a virtual machine, our technology takes\u00a02-seconds.<\/p>
The issue we were solving was to simplify system upgrades. Our products were successful and needed almost no support, but each upgrade was a 3-man-year project. We wanted a solution so we never had to do this again.<\/p>
Separating a user’s personal settings from their virtual machine allowed us to build new virtual machines on every\u00a0login.\u00a0This architecture ensured each user’s machine was perpetually upgraded at login,\u00a0inheriting the latest software every time. It was a self-evolving infrastructure –\u00a0future-proof computing<\/strong>.<\/p>
A second issue to solve was the Boot Storm, a major issue in computing caused by\u00a0multiple users logging in together. This is amplified 10x by building new\u00a0machines and that Build Storm can’t be solved, even by\u00a0a supercomputer.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t
By layering a number of techniques together – caching software\u00a0packages, preparing partial builds, freezing,\u00a0 de-duping, completing some installs after the user is logged in, and accelerating this with supercomputing hardware\u00a0– we compressed the user experience down to 2-seconds.\u00a0This is future-proof computing, built-in seconds, that scales.<\/strong>\u00a0<\/p>
The client base grew to 16,000 consumers and SMBs\u00a0but\u00a0the capability to provision thousands of virtual machines in minutes opened new horizons in large enterprises. Unfortunately, enterprise sales cycles are very\u00a0long. \u00a0<\/p>
The breakthrough came when we\u00a0applied\u00a0this technology to solve a completely different problem – account takeovers of user\u00a0web logins (in banking, etc).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\n\t\t\t\t\t\t
99% of cyber-attacks target PCs and smartphones. The goal is identity theft to steal money, redirect financial transactions, and access private information.<\/p>
The approach we pioneered uses\u00a0pristine-new-remote-virtual-machines where security is paramount\u00a0for an online transaction. Sidestepping\u00a0the user’s device simply bypasses any possible malware running on the local device or network.<\/p>
It was a perfect pivot. Sales cycles reduced\u00a0from 10-months to 10-minutes. It sold for10x the price. Infrastructure cost reduced to 1\/10th.\u00a0Applying the same technology to solving a different problem yielded\u00a01,000x leverage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
BankVault – Pristine Web Security<\/strong>
Hardened, temporary, remote\u00a0burn-machines appear, via a stream of pixels, in the user’s browser. These can be used to secure online transactions,\u00a0open hazardous emails,\u00a0weblinks, or even ransom-ware\u00a0with complete\u00a0immunity.
A related technology harnesses user mobiles, creating\u00a0the illusion of a keyboard to secure\u00a0password\u00a0input.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t