Overview
pMocana provides cyber protection for IoT and mission-critical OT systems. Our device cybersecurity software and management platform enable companies to build self-defending systems that are tamper-resistant. Unlike traditional, IT security approaches, Mocana’s integrated solutions help companies to minimize the risk of a cyber breach, comply with industry standards, and protect intellectual property by ensuring that devices and processes are trusted end-to-end, from device manufacturing to deployment. Founded in 2002, Mocana protects more than 100 million devices and is trusted by the world’s largest aerospace, industrial, energy, healthcare, and telecommunications companies./pSupernova Award Category
Digital Safety, Governance, Privacy, and Cybersecurity
The Problem
pCyber attacks on our critical infrastructure are on the rise. Our most precious resources and services that we depend on every day are at risk. Our water systems, food, medical devices, smart factories, and energy infrastructure are under attack. As these systems become more connected due to the adoption of the Internet of Things (IoT) technologies, they face a wide array of safety, privacy and compliance challenges. More specifically:/p p1) Cyber breaches and IP theft cost businesses billions - the IP Commission Report on the theft of American IP estimates that the annual cost of IP theft to the U.S. Economy is between $225 and 600 billion./p p2) Traditional IT security approaches are not keeping the hackers at bay. A new approach is needed that allows devices to protect themselves rather than relying on network protections./p p3) IMS Research shows 85% of all industrial devices in the field are considered to be legacy, more than ten years old. These older systems are easy to compromise and threaten expose data and enable unauthorized control of critical infrastructure./p p3) There are numerous cyber security standards that organizations must meet; however, these standards are difficult to meet./p p4) Networking and threat hunting are not enough. Threat actors are able to easily compromise devices because there is very little device-based security on a targeted device to prevent an unauthorized user or machine from gaining authorized access./pThe Solution
pMocana has taken a completely different approach to protecting the data privacy and application and device integrity of critical infrastructure. Rather than relying on traditional IT security technologies, Mocana has pioneered a cyber protection system that enables devices to defend themselves and minimizes the risk of compromise by also protecting the processes for managing devices and device security. Mocana is the only provider of an integrated, end-to-end cyber protection system./p pTo successfully enable supply chain provenance and integrity while ensuring devices and software are tamper-resistant, companies need to adopt an end-to-end device security approach that protects devices and the device applications, data, and communications./p pMocana’s solutions are comprised of Mocana TrustPoint™, on-device security software for IoT and embedded devices, and Mocana TrustCenter™, a platform for managing the device security lifecycle./pThe results
pMocana's results and ability to protect critical infrastructure has been astounding. What could be more important than protecting the very systems on which we rely every day: food, water, energy, warmth and safety./p pMocana serves some of the largest aerospace, industrial, energy, healthcare, and telecommunications companies in the world such as: GE, ABB, Schneider Electric, Emerson, HP, Siemens, Avaya, Verizon, ATT, Northrup Grumman, GE, General Dynamics, Harris./p pWe help our customers to solve some of the biggest operational and cyber security risks that impacts their brand, revenue (losses from cyber breaches), IP protection and theft, and compliance. U.S. companies spend more than half a trillion dollars per year on cyber breaches and IP theft./p pOur customers have chosen Mocana because we simplify the integration of technologies, systems and processes that are needed to protect their critical infrastructure. Mocana is installed on more than 100 million devices today, and we believe we will be on billions of devices./pMetrics
pMocana is installed on more than 100 million devices today, and we believe we will be on billions of devices./p pOur customers have reduced the amount of time to implement strong security into their devices from nine months down to three weeks./pThe Technology
pMocana offers an integrated, end-to-end system of cyber protection to help organizations protect their mission-critical infrastructure, enable supply chain provenance, and allow devices to defend themselves. Mocana’s cybersecurity solution includes Mocana TrustPoint, on-device security software that protects the device, and TrustCenter, a platform for managing the device security lifecycle./pDisruptive Factor
pMocana is disrupting the entire security industry. While firewalls, network detection and incidence response services make up a large part of the security industry, modern cyber attacks have easily bypassed these solutions. Mocana TrustPoint is comprised of high performance, on-device security software that is efficient enough for resource-constrained embedded systems and IoT devices. Delivered as software source code and pre-compiled libraries, developers can compile TrustPoint into the application or firmware. TrustPoint uses Mocana’s own cryptographic engine that is U.S. FIPS 140- 2 Level 1 validated and contains no open source code. TrustPoint uses a comprehensive, full-stack architecture for ensuring device integrity, application integrity, data confidentiality and integrity, and communications confidentiality./p pThe on-device software is pre-integrated with more than 70 chipsets and 30 real-time operating systems to simplify integration./p pWhile the rest of the industry is focused on network-based security, Mocana has pioneered an approach to allow all IoT devices to defend themselves. This will reduce the need for many network-based security technologies./pShining Moment
pWe've had so many shining moments. We are protecting systems within the F-35, nuclear and thermal power plants, medical devices and electric substation equipment./p pWe are implemented on 100 million devices and expect to be on billions of devices globally./p