Click here to close now.

Welcome!

@MicroservicesE Blog Authors: Liz McMillan, Elizabeth White, Pat Romanski, Cloud Best Practices Network, Lori MacVittie

Related Topics: Cloud Security, Java IoT, @MicroservicesE Blog, Linux Containers

Cloud Security: Article

Rivetz Leverages Intel, ARM Tech to Deliver Malware Protection

Interview with Steven Sprague, CEO of Rivetz

Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do?

Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect the Crypto Currency Private Keys and Transaction from Malware.  We are building security services for all of the wallet providers to protect the user's secret key, securely display the transaction amounts and trusted Input to assure the users Pin number cannot be stolen. Rivetz is also helping the user to leverage their collection of devices to work together help the user manage their access to the exciting world of Bitcoin providing convenience, backup and protection that comes from having more than one device.

Who is your target audience and how do you intend to reach them?

Sprague: We are building solutions for the users of Bitcoin and other crypto currencies. Providing the benefit of hardware protection of bitcoin on the devices they choose to use. We are using tools from Trustonic and Intel to provide the solutions.

I'd be curious to hear any general thoughts you have on market trends...

Sprague: Crypto Currency provides an incredible opportunity for the modernization of E-commerce. After 20 years of typing in Credit card number and CCV codes and worrying about fraud bitcoin and trusted execution provide an opportunity to revolutionize how we shop online world wide. Bitcoin will provide global access to commerce and trusted execution provide the state of the art security we have been expecting for years.

Why are you targeting the Bitcoin market?

Sprague: Bitcoin is revolutionizing financial services. The potential to change how we all think about commerce on the Internet. In addition to currency, the block chain represents one of the most exciting evolutions of the internet in years. We are adding the ability for the internet to store a fact. This capability will affect every corner of the internet from Currency and E-commerce to Property, and licensing to Identity and Privacy. It is one of the most interesting technologies to come along in years.

What's the business model?

Sprague: We will offer user the opportunity to upgrade the android phone or Intel pc and tablets to leverage the security in their device to protect their bitcoin wallet. There will be a small fee charged to enable these features and will be available as an in Wallet upgrade.  We will also offer the user the opportunity to manage their collection of devices for a small annual fee. Finally we see the opportunity to bind other services the user wishes to register with their collection of devices and believe we can help to retail these service relationships to the customer.

Who are your competitors? What is your differentiator?

Sprague: We compete with two core groups. The first is the protection of your bitcoin through complex process the user is trained to follow. The second is a collection of external hardware devices that provide similar service to Rivetz but are external to your phone or PC. We believe the built-in solution is the customer's preference.

What other market segments will benefit from your technology?

Sprague: Rivetz is focused on building security support for more than just Bitcoin. Services like access to global WIFI or secure messaging that would benefit from the storage and protection of access and encryption keys on my collection of devices can provide tremendous benefit. We look to provide the user with access to a selection of services that will benefit from a higher quality user relationship.

Will mobile device security become a major issue in the future?

Sprague: It is today. The recent compromise in Europe of the device as a second factor is a great example. I would just add that we see no distinction on the size or shape of your device. All devices should be able to provide their user/ Owner with access to the services they desire without having to bother the user to remember complex passwords in their head. By registering ‘My devices' with ‘My services' we can help the user have a simpler and safer relationship with the world.

What other business or technology could yours disrupt?

Sprague: The combination of the blockchain as a registration authority and the trusted execution environment as the secure device representation can offer a new style of service relationship for all cloud services. Trusted display for secure private communications, secure input to assure integrity of user provided data and protection from cloning of user secret keys will have a significant impact on the value of a subscriber.

Who founded the company, when? What can you tell me about the story of the company's founding?

Sprague: My brother and I founded Rivetz in March. After years as the CEO of Wave Systems Corp. an enterprise security software company, I saw a huge opportunity to exercise trusted computing technologies in the consumer market. While exploring the foundations for a new business model and plan I was introduce to Bitcoin in January. The light bulb went off to build a company to Integrate the modern market of Crypto currencies and Bitcoin with the client protections that can be enabled by trusted execution technologies and Rivetz was born.

What is your distribution model? Where to buy your product?

Sprague: We will offer the solution directly for users to download and install. We will also partner with the wallet and device providers to offer the solution for the end user to have a great out of the box experience.

What's next on your product roadmap?

Sprague: We have the tools to build the solution in house and hope to show demonstrations of the capabilities by the end of the summer with an SDK for third parties to leverage the Rivetz tools in the fall.

Are you targeting a first VC round? If yes when and what will you use the funds for? How much money is being sought?

Sprague: We are actively closing our seed round to fund the Demonstration and SDK and set the stage for a series A. We will use our seed round funds to build out the team and show the capabilities, wallet partners and OEM partners to take the solution to market at Scale. We are actively raising up to 1.5 million in our seed round.

What else would you like to add?

Sprague: ever since the first E-commerce transaction we have been waiting for a safer and easier model to shop and do financial services online. We are watching the decay of those systems and the level of fraud is growing daily. Rivetz and bitcoin provide a fresh approach to solving the global challenge and bringing a new age of device level commerce to the world from mobile payments in Africa to buying gold in America. Years and billions of dollars has been invested to build the foundations of this business but the exposure of the device security technology has been a challenge. Bitcoin offers the once in a career opportunity to enable tis transition.

Rivetz is building applications on both the Trustonic and Intel Platforms for trusted execution.

The company is at seed stage and is not started to generate revenues.

About Rivetz
Rivetz Corp. is a new venture focused on improving consumers' relationships with financial and other online services. Rivetz provides a safer and easier-to-use model for all users to protect their digital assets and online transactions using hardware-based device identity and execution protection. The device plays a critical role in automating security and enabling the controls that users need to benefit from modern services. Rivetz leverages state-of-the-art cybersecurity tools to develop a modern model for users and their collection of devices to interact with services on the Internet. For more information, visit www.Rivetz.com.

Follow Rivetz on Twitter at @Rivetzcorp

More Stories By Xenia von Wedel

Xenia von Wedel, Tech blogger and PR Consultant in Mountain View. She mainly writes about B2B solutions, social media and open source software. She is an SVP with a full-service PR agency, serving clients in a variety of industries worldwide. The agency is focused on thought leadership content creation and syndication, media outreach and strategy. Buy her a coffee if you like her article: http://xeniar.tip.me

@MicroservicesExpo Stories
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Data center models are changing. A variety of technical trends and business demands are forcing that change, most of them centered on the explosive growth of applications. That means, in turn, that the requirements for application delivery are changing. Certainly application delivery needs to be agile, not waterfall. It needs to deliver services in hours, not weeks or months. It needs to be more cost efficient. And more than anything else, it needs to be really, dc infra axisreally, super focus...
Sharding has become a popular means of achieving scalability in application architectures in which read/write data separation is not only possible, but desirable to achieve new heights of concurrency. The premise is that by splitting up read and write duties, it is possible to get better overall performance at the cost of a slight delay in consistency. That is, it takes a bit of time to replicate changes initiated by a "write" to the read-only master database. It's eventually consistent, and it'...
Many people recognize DevOps as an enormous benefit – faster application deployment, automated toolchains, support of more granular updates, better cooperation across groups. However, less appreciated is the journey enterprise IT groups need to make to achieve this outcome. The plain fact is that established IT processes reflect a very different set of goals: stability, infrequent change, hands-on administration, and alignment with ITIL. So how does an enterprise IT organization implement change...
Conferences agendas. Event navigation. Specific tasks, like buying a house or getting a car loan. If you've installed an app for any of these things you've installed what's known as a "disposable mobile app" or DMA. Apps designed for a single use-case and with the expectation they'll be "thrown away" like brochures. Deleted until needed again. These apps are necessarily small, agile and highly volatile. Sometimes existing only for a short time - say to support an event like an election, the Wor...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations migh...
At DevOps Summit NY there’s been a whole lot of talk about not just DevOps, but containers, IoT, and microservices. Sessions focused not just on the cultural shift needed to grow at scale with a DevOps approach, but also made sure to include the network ”plumbing” needed to ensure success as applications decompose into the microservice architectures enabling rapid growth and support for the Internet of (Every)Things.
Mashape is bringing real-time analytics to microservices with the release of Mashape Analytics. First built internally to analyze the performance of more than 13,000 APIs served by the mashape.com marketplace, this new tool provides developers with robust visibility into their APIs and how they function within microservices. A purpose-built, open analytics platform designed specifically for APIs and microservices architectures, Mashape Analytics also lets developers and DevOps teams understand w...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud envir...
Sumo Logic has announced comprehensive analytics capabilities for organizations embracing DevOps practices, microservices architectures and containers to build applications. As application architectures evolve toward microservices, containers continue to gain traction for providing the ideal environment to build, deploy and operate these applications across distributed systems. The volume and complexity of data generated by these environments make monitoring and troubleshooting an enormous chall...
Containers and Docker are all the rage these days. In fact, containers — with Docker as the leading container implementation — have changed how we deploy systems, especially those comprised of microservices. Despite all the buzz, however, Docker and other containers are still relatively new and not yet mainstream. That being said, even early Docker adopters need a good monitoring tool, so last month we added Docker monitoring to SPM. We built it on top of spm-agent – the extensible framework f...
There's a lot of things we do to improve the performance of web and mobile applications. We use caching. We use compression. We offload security (SSL and TLS) to a proxy with greater compute capacity. We apply image optimization and minification to content. We do all that because performance is king. Failure to perform can be, for many businesses, equivalent to an outage with increased abandonment rates and angry customers taking to the Internet to express their extreme displeasure.
There's a lot of things we do to improve the performance of web and mobile applications. We use caching. We use compression. We offload security (SSL and TLS) to a proxy with greater compute capacity. We apply image optimization and minification to content. We do all that because performance is king. Failure to perform can be, for many businesses, equivalent to an outage with increased abandonment rates and angry customers taking to the Internet to express their extreme displeasure.
SYS-CON Events announced today that the "Second Containers & Microservices Conference" will take place November 3-5, 2015, at the Santa Clara Convention Center, Santa Clara, CA, and the “Third Containers & Microservices Conference” will take place June 7-9, 2016, at Javits Center in New York City. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
The causality question behind Conway’s Law is less about how changing software organizations can lead to better software, but rather how companies can best leverage changing technology in order to transform their organizations. Hints at how to answer this question surprisingly come from the world of devops – surprising because the focus of devops is ostensibly on building and deploying better software more quickly. Be that as it may, there’s no question that technology change is a primary fac...