Entity
Description
  • Value proposition

    Naoris Protocol validates systems & data in real time, ensuring they are trusted and working as intended

    Naoris Protocol validates systems & data in real time, ensuring they are trusted and are working as intended, protecting against centralized vulnerabilities.

    This is achieved through Naoris Protocol’s Post-Quantum, Sub-Zero blockchain powered by a novel consensus mechanism known as Decentralized Proof of Security (dPoSec)

    Inspiration to create Naoris Protocol came through a meeting with former Head of NATO/OTAN Intelligence Committee Kjell Grandhagen, who stated that “We don’t need to play a better game against cyber-criminals, we need to play a different game”.

    His motivation led to the creation of the world's first Decentralized Security Layer that removes all single points of failure that exist in traditional centralized solutions. This led to the birth of Naoris Protocol in 2018. After extensive R&D and a $31m fund raise in 2022, Naoris Protocol has been recognized with multiple awards while securing strategic partnerships with leading academia, technology innovators, and global enterprises.

    Cyber attacks are rising exponentially with the world facing a $10Trillion cyber damage problem by 2025. As centralized cybersecurity solutions configure devices to operate in silos, systems are easily hacked and therefore cannot be trusted.

    Naoris Protocol’s Decentralised Cybersecurity Mesh Architecture (dCSMA) brings trust to untrusted environments, protecting Web2 & Web3 users, designed to enhance the security infrastructure across all blockchain layers, including L0, L1, L2, DEXes, bridges, validators and global enterprise networks. By converting untrusted devices into cyber-trusted validator nodes that continuously verify the status of every other device in real-time, Naoris Protocol reduces cyber threats by an order of magnitude, enables immutable sharing of ‘proof of trust’ between devices, systems and organizations that previously could not trust each other, while significantly improving data quality.


    cybersecurity, blockchain, cryptography, Web 3 Security, decentralised technology, Cyber Threats, Cyber Attacks, Smart Contracts, Smart Contract Audit, Security Audit, Security breaches, web 2 Security, Defi Security, Swarm AI, Distributed AI, SIEM, Endpoint protection, Endpoint security, Security Information, and Hacks

  • Naoris Protocol

    Naoris Protocol validates systems & data in real time, ensuring they are trusted and working as intended, protecting against centralized vulnerabilities.

  • https://www.naorisprotocol.com/
Corporate interactions BETA
Corporate TypeTweets Articles
Collision Conf Collision Conf
Other

12 Jun 2024


Deutsche Telekom
Deutsche Telekom
Telecoms, Telecommunications
Deutsche Telekom
Telecoms, Telecommunications
Other

26 Jun 2023


Binary District Journal
Binary District Journal
Media Production
Binary District Journal
Media Production
Not capitalistic
Not partnership
Event

18 Sep 2019


Similar entities
Loading...
Loading...
Social network dynamics