With each passing year, Sertainty technology has moved further from the conceptual stage to developing a myriad of practical applications. Sertainty has built a data-centric, data-level, self-protecting-data technology from the ground up, and what seemed impossible yesterday has become feasible and proven today. Through groundbreaking partnerships, Sertainty has already established its proofs and commercialized its technologies in concrete, transformative ways.
As Sertainty continues to implement its technical expertise across industries, the true potential of these systems becomes more and more apparent. While each sector brings a unique set of needs and criteria, the Sertainty zero-trust security platform and advanced data privacy solutions rise to the challenge, proving, again and again, the value of the applied technology.
Notable Partnerships and Applications
Infrastructure with CIEDAR
Of the many applications of the Sertainty Self-Protecting-Data, infrastructure is a clear beneficiary. In 2021, Texas State University and its Connected Infrastructure Consortium- CIEDAR, joined forces with Sertainty to solve the exposure in the Energy Sector pertaining to Ransomware and flag matters with the likes of Kinder-Morgan and Production Partners. The intent for Phase 1 was to utilize the CIEDAR Consortium’s Smart Networks Lab to assert a “Digital Twin” construct aimed at a Nation-State attack on a carrier and investigate complementary technologies, toward the goal of negating such.
The CIEDAR Sensor Lab serves as a sandbox to assert Sertainty Self-Protecting-Data and Smart Messaging technology for a composite of sensors and mainstay devices along a LoRaWAN topology. CIEDAR Smart Utilities Lab will also provide the opportunity to create a first-to-the-market Self-Protecting Data construct with EasyMetering LLC regarding securing and enabling distributed intelligence aimed at an Advanced Meter Infrastructure (HMI) Alignments with Anterix and Ericsson were close to follow, as well.
Moreover, the CIEDAR project is also intended to benefit the Ingram Outflow Sensor Project – in the long run, since stormwater outflow of pollutants persists in the cement industry and the fines keep mounting, with a LoRaWAN-capable endpoint device that conserves power, simplifies configuration, and provides trusted telemetry and data r to a regulator or judicial court.
Biometrics with SmartEye
The Sertainty patent engine is responsible for monumental developments in the world of secure connections and biometrics. In 2017, Sertainty was granted Notice of Allowance for SmartID, SmartMessage, SmartLicense, SmartPortal, and SmartCloud claims.
These technological developments came to fruition last year, when Sertainty announced its partnership with biometric authentication pioneer Smart Eye Technology. Foundational to this partnership, Sertainty UXP Technology embeds specified file restrictions in Smart Eye biometric files, giving them the ability to self-govern and self-protect.
Critical Communications and Exploration with FAU
Florida Atlantic University partnered with Sertainty to develop their critical communications infrastructure after identifying five use cases for Sertainty technology. Here, Sertainty solutions are aimed at securing sensitive data on an end-to-end basis using the Sertainty patented Unbreakable Exchange Protocol (UXP) technology.
The FAU partnership is allowing Sertainty’s systems to create better solutions for applications in extreme environments and conditions. As part of the partnership, Sertainty and FAU support are focused on IoT sensors, leveraging autonomous vehicles, as well as ensuring command and control communications.
Military Applications with UTSA-NSCC and AF16 Cyber Command
Sertainty has also partnered with the University of Texas-San Antonio National Security Collaboration Center (UTSA-NSCC). In this instance, Sertainty Self-Protecting-Data technology will be incorporated into an NSCC contract with the AF16 Cyber Command.
Moreover, this is far from the only military application of Sertainty security tools. In 2021, Representative Dr. Mark Green (R-TN) of the House Committee on Armed Services successfully incorporated the Sertainty language regarding data security “while at rest, in motion and in use” into the Department of Defense 2020 DOD Strategy. Rather than generic security measures, the language of the strategy favors functionality that, as of today, only Sertainty technology can offer.
FinTech with Tortuga
Tortuga Growth Partners and Sertainty are also currently in the process of finalizing a business/technology relationship, establishing Tortuga as the first Sertainty Technology Licensee. As part of the plan, Tortuga is rolling up six entities to create a FinTech-centric platform with multiple locations in six countries and combined revenue of $50M.
Secure CCM with Uluro
Customer communications management (CCM) is perhaps one of the areas in which Sertainty technology is having the greatest impact. Uluro, a comprehensive, data-centric communications platform created by Transformations, Inc., uses Sertainty encryption to ensure security and compliance in all communication platforms. Additionally, Sertainty zero-trust protocols are integral to Uluro’s uSecure solution.
In addition to being a powerful example of Sertainty tools in action, this partnership demonstrates the revenue-generating potential of Sertainty solutions. The fruitful effectiveness of integrated Sertainty data security tools makes fruitful partnerships like the one between Sertainty and Transformations, Inc. possible.
The above examples represent only a selection of a myriad of real-world examples where Sertainty zero-trust security technology is already forging new paths forward. While many technology platforms are fundamentally limited in their scope, Sertainty data protection technology is truly industry-agnostic, with the potential to upgrade or redefine how data is stored and distributed.
As demonstrated by these and other partnerships, the concepts driving Sertainty data solutions more than stand up when applied to the various programs where they are needed.