Click here to close now.




















Welcome!

Microservices Expo Authors: AppDynamics Blog, Cloud Best Practices Network, Liz McMillan, Elizabeth White, Trevor Parsons

Related Topics: Cloud Security, Java IoT, Microservices Expo, Linux Containers

Cloud Security: Article

Rivetz Leverages Intel, ARM Tech to Deliver Malware Protection

Interview with Steven Sprague, CEO of Rivetz

Rivetz Corp. has been named as one of the AlwaysOn Global 100 Companies to Watch, congratulations! Please tell us, what is Rivetz all about and what do you do?

Steven Sprague: Rivetz is leveraging the trusted execution technologies in new devices powered by Intel and ARM to protect the Crypto Currency Private Keys and Transaction from Malware.  We are building security services for all of the wallet providers to protect the user's secret key, securely display the transaction amounts and trusted Input to assure the users Pin number cannot be stolen. Rivetz is also helping the user to leverage their collection of devices to work together help the user manage their access to the exciting world of Bitcoin providing convenience, backup and protection that comes from having more than one device.

Who is your target audience and how do you intend to reach them?

Sprague: We are building solutions for the users of Bitcoin and other crypto currencies. Providing the benefit of hardware protection of bitcoin on the devices they choose to use. We are using tools from Trustonic and Intel to provide the solutions.

I'd be curious to hear any general thoughts you have on market trends...

Sprague: Crypto Currency provides an incredible opportunity for the modernization of E-commerce. After 20 years of typing in Credit card number and CCV codes and worrying about fraud bitcoin and trusted execution provide an opportunity to revolutionize how we shop online world wide. Bitcoin will provide global access to commerce and trusted execution provide the state of the art security we have been expecting for years.

Why are you targeting the Bitcoin market?

Sprague: Bitcoin is revolutionizing financial services. The potential to change how we all think about commerce on the Internet. In addition to currency, the block chain represents one of the most exciting evolutions of the internet in years. We are adding the ability for the internet to store a fact. This capability will affect every corner of the internet from Currency and E-commerce to Property, and licensing to Identity and Privacy. It is one of the most interesting technologies to come along in years.

What's the business model?

Sprague: We will offer user the opportunity to upgrade the android phone or Intel pc and tablets to leverage the security in their device to protect their bitcoin wallet. There will be a small fee charged to enable these features and will be available as an in Wallet upgrade.  We will also offer the user the opportunity to manage their collection of devices for a small annual fee. Finally we see the opportunity to bind other services the user wishes to register with their collection of devices and believe we can help to retail these service relationships to the customer.

Who are your competitors? What is your differentiator?

Sprague: We compete with two core groups. The first is the protection of your bitcoin through complex process the user is trained to follow. The second is a collection of external hardware devices that provide similar service to Rivetz but are external to your phone or PC. We believe the built-in solution is the customer's preference.

What other market segments will benefit from your technology?

Sprague: Rivetz is focused on building security support for more than just Bitcoin. Services like access to global WIFI or secure messaging that would benefit from the storage and protection of access and encryption keys on my collection of devices can provide tremendous benefit. We look to provide the user with access to a selection of services that will benefit from a higher quality user relationship.

Will mobile device security become a major issue in the future?

Sprague: It is today. The recent compromise in Europe of the device as a second factor is a great example. I would just add that we see no distinction on the size or shape of your device. All devices should be able to provide their user/ Owner with access to the services they desire without having to bother the user to remember complex passwords in their head. By registering ‘My devices' with ‘My services' we can help the user have a simpler and safer relationship with the world.

What other business or technology could yours disrupt?

Sprague: The combination of the blockchain as a registration authority and the trusted execution environment as the secure device representation can offer a new style of service relationship for all cloud services. Trusted display for secure private communications, secure input to assure integrity of user provided data and protection from cloning of user secret keys will have a significant impact on the value of a subscriber.

Who founded the company, when? What can you tell me about the story of the company's founding?

Sprague: My brother and I founded Rivetz in March. After years as the CEO of Wave Systems Corp. an enterprise security software company, I saw a huge opportunity to exercise trusted computing technologies in the consumer market. While exploring the foundations for a new business model and plan I was introduce to Bitcoin in January. The light bulb went off to build a company to Integrate the modern market of Crypto currencies and Bitcoin with the client protections that can be enabled by trusted execution technologies and Rivetz was born.

What is your distribution model? Where to buy your product?

Sprague: We will offer the solution directly for users to download and install. We will also partner with the wallet and device providers to offer the solution for the end user to have a great out of the box experience.

What's next on your product roadmap?

Sprague: We have the tools to build the solution in house and hope to show demonstrations of the capabilities by the end of the summer with an SDK for third parties to leverage the Rivetz tools in the fall.

Are you targeting a first VC round? If yes when and what will you use the funds for? How much money is being sought?

Sprague: We are actively closing our seed round to fund the Demonstration and SDK and set the stage for a series A. We will use our seed round funds to build out the team and show the capabilities, wallet partners and OEM partners to take the solution to market at Scale. We are actively raising up to 1.5 million in our seed round.

What else would you like to add?

Sprague: ever since the first E-commerce transaction we have been waiting for a safer and easier model to shop and do financial services online. We are watching the decay of those systems and the level of fraud is growing daily. Rivetz and bitcoin provide a fresh approach to solving the global challenge and bringing a new age of device level commerce to the world from mobile payments in Africa to buying gold in America. Years and billions of dollars has been invested to build the foundations of this business but the exposure of the device security technology has been a challenge. Bitcoin offers the once in a career opportunity to enable tis transition.

Rivetz is building applications on both the Trustonic and Intel Platforms for trusted execution.

The company is at seed stage and is not started to generate revenues.

About Rivetz
Rivetz Corp. is a new venture focused on improving consumers' relationships with financial and other online services. Rivetz provides a safer and easier-to-use model for all users to protect their digital assets and online transactions using hardware-based device identity and execution protection. The device plays a critical role in automating security and enabling the controls that users need to benefit from modern services. Rivetz leverages state-of-the-art cybersecurity tools to develop a modern model for users and their collection of devices to interact with services on the Internet. For more information, visit www.Rivetz.com.

Follow Rivetz on Twitter at @Rivetzcorp

More Stories By Xenia von Wedel

Xenia von Wedel, Tech blogger and PR Consultant in Mountain View. She mainly writes about B2B solutions, social media and open source software. She is an SVP with a full-service PR agency, serving clients in a variety of industries worldwide. The agency is focused on thought leadership content creation and syndication, media outreach and strategy. Buy her a coffee if you like her article: http://xeniar.tip.me

@MicroservicesExpo Stories
The Internet of Things. Cloud. Big Data. Real-Time Analytics. To those who do not quite understand what these phrases mean (and let’s be honest, that’s likely to be a large portion of the world), words like “IoT” and “Big Data” are just buzzwords. The truth is, the Internet of Things encompasses much more than jargon and predictions of connected devices. According to Parker Trewin, Senior Director of Content and Communications of Aria Systems, “IoT is big news because it ups the ante: Reach out ...
Cloud Migration Management (CMM) refers to the best practices for planning and managing migration of IT systems from a legacy platform to a Cloud Provider through a combination professional services consulting and software tools. A Cloud migration project can be a relatively simple exercise, where applications are migrated ‘as is’, to gain benefits such as elastic capacity and utility pricing, but without making any changes to the application architecture, software development methods or busine...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Sysdig has announced two significant milestones in its mission to bring infrastructure and application monitoring to the world of containers and microservices: a $10.7 million Series A funding led by Accel and Bain Capital Ventures (BCV); and the general availability of Sysdig Cloud, the first monitoring, alerting, and troubleshooting platform specializing in container visibility, which is already used by more than 30 enterprise customers. The funding will be used to drive adoption of Sysdig Clo...
Auto-scaling environments, micro-service architectures and globally-distributed teams are just three common examples of why organizations today need automation and interoperability more than ever. But is interoperability something we simply start doing, or does it require a reexamination of our processes? And can we really improve our processes without first making interoperability a requirement for how we choose our tools?
What we really mean to ask is whether microservices architecture is SOA done right. But then, of course, we’d have to figure out what microservices architecture was. And if you think defining SOA is difficult, pinning down microservices architecture is unquestionably frying pan into fire time. Given my years at ZapThink, fighting to help architects understand what Service-Oriented Architecture really was and how to get it right, it’s no surprise that many people ask me this question.
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
JavaScript is primarily a client-based dynamic scripting language most commonly used within web browsers as client-side scripts to interact with the user, browser, and communicate asynchronously to servers. If you have been part of any web-based development, odds are you have worked with JavaScript in one form or another. In this article, I'll focus on the aspects of JavaScript that are relevant within the Node.js environment.
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL...
"Vicom Computer Services is a service provider and a value-added reseller and we provide technology solutions, infrastructure solutions, security and management services solutions," stated Amitava Das, Chief Technology Officer at Vicom Computer Services, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Microservices are hot. And for good reason. To compete in today’s fast-moving application economy, it makes sense to break large, monolithic applications down into discrete functional units. Such an approach makes it easier to update and add functionalities (text-messaging a customer, calculating sales tax for a specific geography, etc.) and get those updates / adds into production fast. In fact, some would argue that microservices are a prerequisite for true continuous delivery. But is it too...
Worldwide, there's a growing appreciation for the many benefits of the Open Source way. Clearly, being truly Open is a frame of mind that can apply to just about anything in life -- including the development and nurture of a progressive company culture that's equipped for the challenges and opportunities of today's Global Networked Economy. Jim Whitehurst, CEO of Red Hat, recently launched his new book entitled "The Open Organization" -- Igniting Passion and Performance. He says, "The conventio...
This week, I joined SOASTA as Senior Vice President of Performance Analytics. Given my background in cloud computing and distributed systems operations — you may have read my blogs on CNET or GigaOm — this may surprise you, but I want to explain why this is the perfect time to take on this opportunity with this team. In fact, that’s probably the best way to break this down. To explain why I’d leave the world of infrastructure and code for the world of data and analytics, let’s explore the timing...