Social networks
84 444 1,923Activities
Technologies
Entity types
Location
251 Little Falls Dr, Wilmington, DE 19808, USA
Wilmington
United States of America
Employees
Scale: 11-50, 2-10
Estimated: 21
Engaged corporates
3Added in Motherbase
4 years, 10 months agoNaoris Protocol validates systems & data in real time, ensuring they are trusted and working as intended
Naoris Protocol validates systems & data in real time, ensuring they are trusted and are working as intended, protecting against centralized vulnerabilities.
This is achieved through Naoris Protocol’s Post-Quantum, Sub-Zero blockchain powered by a novel consensus mechanism known as Decentralized Proof of Security (dPoSec)
Inspiration to create Naoris Protocol came through a meeting with former Head of NATO/OTAN Intelligence Committee Kjell Grandhagen, who stated that “We don’t need to play a better game against cyber-criminals, we need to play a different game”.
His motivation led to the creation of the world's first Decentralized Security Layer that removes all single points of failure that exist in traditional centralized solutions. This led to the birth of Naoris Protocol in 2018. After extensive R&D and a $31m fund raise in 2022, Naoris Protocol has been recognized with multiple awards while securing strategic partnerships with leading academia, technology innovators, and global enterprises.
Cyber attacks are rising exponentially with the world facing a $10Trillion cyber damage problem by 2025. As centralized cybersecurity solutions configure devices to operate in silos, systems are easily hacked and therefore cannot be trusted.
Naoris Protocol’s Decentralised Cybersecurity Mesh Architecture (dCSMA) brings trust to untrusted environments, protecting Web2 & Web3 users, designed to enhance the security infrastructure across all blockchain layers, including L0, L1, L2, DEXes, bridges, validators and global enterprise networks. By converting untrusted devices into cyber-trusted validator nodes that continuously verify the status of every other device in real-time, Naoris Protocol reduces cyber threats by an order of magnitude, enables immutable sharing of ‘proof of trust’ between devices, systems and organizations that previously could not trust each other, while significantly improving data quality.
cybersecurity, blockchain, cryptography, Web 3 Security, decentralised technology, Cyber Threats, Cyber Attacks, Smart Contracts, Smart Contract Audit, Security Audit, Security breaches, web 2 Security, Defi Security, Swarm AI, Distributed AI, SIEM, Endpoint protection, Endpoint security, Security Information, and Hacks
Naoris Protocol validates systems & data in real time, ensuring they are trusted and working as intended, protecting against centralized vulnerabilities.
Corporate | Type | Tweets | Articles | |
---|---|---|---|---|
Collision Conf | Other 12 Jun 2024 | | ||
Deutsche Telekom Telecoms, Telecommunications | Deutsche Telekom Telecoms, Telecommunications | Other 26 Jun 2023 | | |
Binary District Journal Media Production | Binary District Journal Media Production | Not capitalistic Not partnership Event 18 Sep 2019 | |