Before you introduce VALIDY can you answer these 3 questions?
Surprising as it may seem the answer is YES to these 3 questions, thanks to the breakthrough technology VALIDY TECHNOLOGY.
VALIDY NET INC was established in 1998 in Portland, Oregon (USA). It has a French subsidiary VALIDY SAS.
$ 10 Million (USD) was invested to provide intellectual protection for his invention and to develop a proof of concept (POC). VALIDY NET INC is funded by 300 Business Angels.
Its technical director, co-inventor of VALIDY TECHNOLOGY, worked at PARC (Palo Alto Research Center), one of the best Silicon Valley laboratories.
Its patent portfolio covers many countries: USA, France, Norway, Belgium, Germany, United Kingdom, Ireland, Italy, Spain, Switzerland, Russia, China, Hong Kong, India, Eurasia, Australia, Japan, South Korea, Morocco, Philippines, South Africa.
Business model:License grant of VALIDY TECHNOLOGY
Turnover : $0
By deploying the technology invented by VALIDY, called VALIDY TECHNOLOGY, globally with industrial partners and institutions around the world.
Processor manufacturers, computer manufacturers, industrial equipment manufacturers, automotive manufacturers, computer service companies, software publishers, etc…
VALIDY TECHNOLOGY is changing the game of IT security.
It is a "seminal" and generic technology that applies wherever there is digital electronics.
It's a disruptive technology, a real paradigm shift. An unexplored path so far.
It restores the balance between attack and defense in cyberspace.
Any IT developer can implement it without being a computer security specialist.
It is so effective that hackers cannot build reasonable test platforms to prepare for their attack.
VALIDY TECHNOLOGY allows a program to protect itself without a trusted third party. A running program checks in real time that its progress is consistent with the expected execution when the developer compiled the program.
July 2001, Filing of Patent Applications at INPI and USPTO.
February 2002, Meeting at the Elysée Palace by the Councilors of the French President.
June 2005, Meeting at the French Ministry of Defense by the economic, financial and administrative adviser of the Minister of Defense.
September 2005, Nomination at the IST Prize, the most prestigious contest of the European community concerning information technologies.
November 2005, Selection at the ICT Conference (Ireland), as one of the 20 most "cutting edge" technologies in Europe.
January 2006, Publication press article in the Drôme Economy Magazine: "Stop industrial piracy".
April 2006, Publication press article in HACKADEMY MAGAZINE: "Reversing, the study of an unprecedented protection".
June 2007, MOTOROLA Award at the Sino-European ChinICT 2007 in Beijing.
November 2007, Labeling of SECTOKEN project by the MINALOGIC global competitiveness cluster.
May 2008, Press article published in RUE89: "VALIDY, the setbacks of a start-up in spies’ country ".
September 2010, VALIDY is semi-finalist at the prestigious "AMERICAN SECURITY CHALLENGE" competition
January 2011, Registration of VALIDY TECHNOLOGY at the National Security Agency (NSA)Acquisition Resource Center.
March 2011, Publication press article in Mag-securs N0 29: "Learning the lessons of the STUXNET case".
April 2011, Presentation to the National Security Agency (NSA), during “Business In a Minute”.
September 2013, Presentation of VALIDY TECHNOLOGY at the US Department of Defense INSCOM, Fort Meade.
April 2016, Reception of a letter from President Barack OBAMA, who calls to federate forces to protect cyberspace.
Many companies and intermediaries have worked with VALIDY for business intelligence and technology watch purposes. VALIDY is not known to the general public and companies of intermediate sizes. On the other hand, it is well known to large companies and large groups that envy its technology and its patent portfolio.
VALIDY TECHNOLOGY applies wherever there is digital electronics. Its market is as wide as the global market for electronics and information technology.
These applications are both civil and military: it's a "dual technology"
It is particularly useful in those fields:
Financial, Technological, Governmental, Health, Energy, Trade, Production, Transport, Insurance, Banking, Robotics.
It is especially effective for protecting embedded systems.
Very resource efficient, its the only one really able to protect the Internet of Things (IOT).
It also protects distributed systems such as those operated by the Operators of Vital Importance, including those driven by SCADA and all systems involved in the "Cloud".
(Nuclear power station, railway network, telecommunication network, water distribution network, energy distribution network, airport infrastructure, boats, planes, cars, etc ...)
A system protected by VALIDY TECHNOLOGY can be updated by its designer without difficulties, it is also one of its enormous assets.
It allows all security applications to secure themselves
It allows a real Defense In Depth of the systems
It also allows security service platforms (SAAS) to secure themselves
VALIDY TECHNOLOGY detects any attempt to corrupt a program, from outside as well as from inside. It restores confidence in digital systems. Any computer program can defend itself. It even allows a program to guarantee that it works normally even when running on a corrupted system. Applied to all levels of a computer system, processor’s microarchitecture, firmware, drivers, operating system, database engine, file manager, application running on the system or even distributed systems running in the "Cloud", it provides a real Defense In Depth.
By nature VALIDY TECHNOLOGY is a perfect anti-virus, able to detect any unknown never listed virus ("Zero Day" attack).
When an equipment is protected by VALIDY TECHNOLOGY, a hacker cannot use that equipment to prepare an attack.
VALIDY TECHNOLOGY, deployed globally, would have countered the STUXNET, WANNACRY and PETYA attacks.
VALIDY TECHNOLOGY, deployed globally, would have helped protect processors from MELTDOWN and SPECTRE vulnerabilities by detecting in real time that the processor is under attack and implementing the appropriate retaliatory measures.
VALIDY TECHNOLOGY solves a lot of problems, and solves it well, but it doesn’t solve everything. It is for example ineffective against attacks based on Social Engineering.
It is also inefficient for countering identity theft.
VALIDY TECHNOLOGY restores the balance between defense and attack in cyberspace and generally in the digital world.
It significantly strengthens the defense capabilities of electronic and computer equipments against both insiders and outsiders attacks.
Protected weapons systems remain secure, under the control of their users, in accordance with their manufacturer's specifications.
VALIDY TECHNOLOGY can protect information infrastructures, making them much more difficult to penetrate and less prone to data theft.
It prevents mass attacks across networks. A service in physical possession of a protected equipment, has means of additional attacks, allowing, with the appropriate tools, to extract the information that would be hidden in this equipment.
It should be noted that the physical attack of a protected equipment, does not weaken the protection of other equipment of the same type.
The Antivirus editors have realized that they have to change paradigms, and that antivirus scanning based on virus signatures is becoming increasingly inefficient.
So they started building new security systems based on artificial intelligence modules to detect upstream threats.
The hackers understood that to go under the radars of these new antivirus they have to design viruses with artificial intelligence which must also learn how to go indetected. The competition between attack and defense in cyber space thus becomes a struggle between artificial intelligence systems, substantially increasing the potential danger of new attacks.
VALIDY TECHNOLOGY is becoming more and more necessary to avoid any loss of control of these artificial intelligence systems.
It can protect Artificial Intelligence systems themselves so that hackers cannot change the code of these systems. It can also protect the data used to train these systems so that
hackers cannot change the behavior of these artificial intelligences by this means.
Finally VALIDY TECHNOLOGY, thanks to the patent "Detection & coercion", can allow an artificial intelligence to exploit this signal in order to contribute to detect any attack worldwide.
VALIDY TECHNOLOGY is complementary to security systems based on Artificial Intelligence and necessary, or even essential, to protect them from any corruption by hackers.
VALIDY TECHNOLOGY is essential to ensure the integrity of robotic systems, it allows manufacturers to ensure that their robots always work according to their specifications.
intended for processor designers and / or founders
for companies that prescribe and market VALIDY technology
intended for companies that integrate VALIDY technology into their infrastructures, systems, equipment, etc ...
Application license to different sectors
Because VALIDY TECHNOLOGY is a seminal technology that affects all sectors of activity, it is essential that every manufacturer, large or small, can implement VALIDY TECHNOLOGY with all its professionalism to secure its customers.
VALIDY pays particular attention to a Fair, Reasonable, And Non Discriminatory (FRAND) licensing model.
Based on this business model, the deployment of VALIDY TECHNOLOGY can rely on the professionalism and experience of all. The challenge of cyber security and cyber defense is so important that federating globally has become indispensable.
For many years, VALIDY considered that the problems it faced were inherent in the problems of a disruptive technology.
Communicate on VALIDY and its technology.