How to Secure Blockchain TechnologiesBitcoin Blockchain’s Simple Security Model Evolves Rapidly for More Complex Use Cases

DOWNLOAD EXCERPT

This report identifies the rapidly evolving security measures (including permissions, encryption, hardware security processors, and application security) needed for common closed business applications of blockchain. It also examines what these measures mean for the core distributed ledger algorithms in both public and private blockchain systems.

Securing the newer blockchain technologies requires that organizations understand how the security characteristics of spinoff ledger technologies differ from the original Bitcoin network. This report traces the evolution of blockchain from a conceptually simple distributed ledger meant to prevent “Double Spend” of e-cash into various incarnations aimed at complex activities, from identity management to intellectual property security. 

A previous Constellation report, Beyond the Hype: Understanding the Weak Links in the Blockchain, described how this technology is inspiring fundamentally new developments.

Get Access to This Premium Content
Already a member? Login to Access
Premium Content

Premium content. Log in to your account here. If you do not have a premium membership login, become a member of the Constellation Executive Network or Research Unlimited account. Please contact [email protected] to ask about your access options or click the price below to purchase this report individually.