Imagine you are in elementary school. Your mother discovers your lunch bag sitting on the counter at home and walks to school to deliver it to you. You've been playing a game with your friends, where everyone swaps jackets and runs around the playground. When your mom arrives, does she hand your lunch to a different kid, who happens to be wearing your coat? No! There are many factors beyond outerwear involved in helping her accurately identify her own child.
Identity means selecting one and only one from among many nearly identical choices, even if there are obfuscating factors. The process of identity has become mission critical for both friend and foe. It is both the primary means of defense and attack in the cybersecurity domain. Identity also plays a crucial role in many biologic processes from genetics and reproduction to immunity. Identity is a core function, if not the core function, of information processing.
We have arrived at a critical juncture in technology, trying to keep the corpse of our decades-old identity technology functioning on life support using patches and best practices. We are failing. We have gotten to the point of admitting that our identity protection schemes are going to be compromised and so our focus has shifted to detecting a compromise as soon as possible and containing the damage.
At QWERX, we are unwilling to accept this approach. We have created a simple and easy-to-deploy, non-disruptive solution that solves the device identity problem. Our solution, QWERX Enterprise Secure Perimeter (QESP), enables continuous verification of all connected devices in a manner that cannot be exploited by an attacker using a spoofed credential that "looks like" one that belongs on the network. Instead of static certificates that can be stolen or copied, QWERX technology relies on dynamic information inputs that force a positive identification -- just like how the school bully can't trick your mom into giving him your lunch by wearing your coat.