VIBE is an acronym for Verifiable Identity Based Encryption.
It is certificate-less and disrupts popular authentication and key exchange protocols. VIBE enables Zero-Trust networking by authenticating all users, devices, data, and transactions at the application layer. With VIBE, there is no need to protect public parameters, thus eliminating the risk of man-in-the-middle attacks. The patented VIBE cryptosystem also solves chronic key management problems involving Key Reissuance, Key Revocation, Key Escrow and Digital Signing. VIBE is made for today’s collaborative, connected, digital world.
If you have an application or service offering that you are seeking to secure, let’s start a conversation.
Fundamental to data security is the ability to verify users, devices, and data as authentic – that their identities and content have not been compromised.
Globally-connected and diverse public Clouds, private servers, big data warehouses, third-party software platforms make user and data authentication crucial. Traditional encryption, like that of Public Key Infrastructure (PKI), is costly, inflexible, slow, and strewn with inherent vulnerabilities that make it unusable in our 21st century digital world. By design, VIBE is made for today’s dispersed, interconnected, high-speed virtual world.
VIBE’s certificate-less user and data authenticated encryption technology ensures scalability, dynamic key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC). VIBE eliminates the need for costly, cumbersome PKI. It is perfectly suited to secure Applications, Cloud, Internet of Things (IoT), Collaboration platforms, Blockchain, FinTech systems, Email, V2V, V2X, Smart City and virtually every other connected solution that is in need of ironclad authentication and encryption.
VIBE is not a solution. It is a cryptographic ingredient that can be embedded in your connected products, services and solutions, with applicability in virtually every industry.
The Cloud is becoming increasingly pervasive as businesses, large and small, and governments at all levels are migrating applications to the Cloud. Cloud security, however, is an ongoing issue, one exacerbated by the emergence of Edge and Fog computing technology designed to better accommodate the massive number of devices connected to the Cloud. The unique nature of the VIBE cryptographic schemas is that it can easily and successfully secure all elements of the Cloud, and the myriad applications it enables, as VIBE authenticates at the application level – from the Edge to the Core. This renders VIBE an ideal security solution for governments and enterprises, particularly those that use third-party services and applications for internal communication, data storage and computing resources. With VIBE, organizations can host their own Trusted Centres to issue private keys to secure all communications, and to fully protect their intellectual property.
Cloud applications that VIBE can more effectively secure include:
VIBE-enabled Cloud solutions easily and economically scale to any level, and deliver security at a level unparalleled in the industry.
Commonly devices rely on semiconductors as a part of their functionality and increasingly, these products are able to communicate with each other through the Internet. There are very few security standards within the IoT and yet millions of devices are being deployed daily with no embedded security. Dated security approaches such as PKI are overly complex to set up and manage, are highly vulnerable to outside threats, are costly and cannot scale.
Mobile and Blockchain developers can deploy VIBE to provide secure authentication of users and or/transaction, and to economically and seamlessly handle key exchange requirements. Its certificate-less feature and peer-to- peer functionality make it a perfect security ingredient for e-banking solutions and so much more.
VIBE is “Social by Design” meaning that organizations can set up Trusted Centres (TC) wherein only users or devices registered as members of the TC can communicate with one another. Typically, a TC would be housed in a Hardware Security Module (HSM). Members of one TC can communicate with members of another TC on a permissions/rules basis. Once set up, the TC can be taken offline eliminating the threat of the TC being hacked.
As a use case, an Enterprise like a bank might register all its email users in one TC, and have its clients register in another. With permission, the only email communication that could occur would be from registered or authenticated users. Attempts by outside parties to “phish” within the company’s digital waters would be automatically thwarted as the intended recipient would never receive the nefarious communication.
With decades of IT/Cyber experience, our leadership team is working to make VIBE the global standard for secure communications.
Bill is the visionary behind the development of VIBE. Bill is recognized globally as a cyber-security thought-leader bent on communicating the power of the company’s patented, proven cryptography. Bill is a passionate, natural team leader with infectious enthusiasm. He has a knack for discovering people, partners and technology that can leverage the power of VIBE, creating powerful, new solutions that secure our connected world.
A visionary entrepreneur with long-standing practice and former senior manager with proven success within multinational enterprises. Track record in business setup, business restructuring and realignment as well as operations up-scaling. Hisham is a senior executive with 35+ years of experience in high tech industries, spanning ICT, security and semiconductor technologies, business process transformation, digitization as well as cloud based solutions and services.
Mike is a highly diverse leader with a background that includes everything from running a $1.6B telecom business unit, to being at the forefront of myriad emerging technologies, ranging from early days e-mail and v-mail to the dawn of the Internet. Mike sees VIBE as the “next big thing” and to that end has shaped the social media campaign that has imprinted VIBE in the minds of thousands worldwide.
Olivier has an extensive background in digital security. Our go-to team leader for all things embedded, Olivier has a deep understanding of VIBE, and he knows how to explain it in a way that is consistently creating “Ah-Ha” moments within our rapidly growing partner community.
Named Top Person To Follow on Tech by LinkedIn. Former Technology Partner Advisor at Bill and Melinda Gates Foundation. Helped “stand up” Office of Legislative at DHS. Served as first Director of Legislative Affairs at the DHS Science & Technology Directorate. A thought leader, influencer, technology evangelist. A featured writer/speaker/blogger. Topics include: homeland security, cyber security, CBRNE, artificial intelligence (AI), Internet of Things (IoT), science & technology, public/private partnerships, risk management, blockchain, innovation. Published in FORBES, Huffington Post, InformationWeek, MIT Sloan Blog, Computerworld, Federal Times, NextGov and many more.
A former president of NASDAQ. Chairman of Princeton Capital Management. Was a Captain in the 438th Military Airlift Wing, and served as a Major in the USAF Reserve.
He has testified before the Joint Committee on Economics of the US Congress, and before the House Science Committee, the House Permanent Select Committee on Intelligence, and the House Committee on Homeland Security. Served on the International Advisory Council for the Monetary Authority of Singapore, and is currently on the Board of Visitors of the University of Maryland School of Medicine, and a Trustee of Hollins University.
Al earned a B.A. from the University of Virginia, and received his M.B.A. from The Wharton School at the University of Pennsylvania.
A total of 45 years of experience in software engineering, Decision Sciences, System Dynamics Modeling, Scenario Planning, International Standards, business strategy synthesis, and simulation. Mr. Bergman’s background includes 12 years of flight simulator design for USAF high-performance aircraft and 28 years at Intel applying quantitative decision methodologies to improve international standards negotiations and strategic business decisions. Mr. Bergman represented Intel at GSM Association, 3GPP (wireless com standards), IETF, oneM2m (IOT standards), and Open Mobile Alliance (Digital Rights Management standards).
Mr. Bergman attended MIT and SUNY at Albany earning a BS degree in Electrical Engineering & Computer Science, with graduate work in system dynamics.
Paul has extensive experience in cybersecurity. He served as the U.S. Representative to NATO for Information Security. As Special Assistant to the Director of the NSA he participated in technology research, investment, and partnerships in international cybersecurity and telecom technologies. Early in his NSA career, he carried out system penetration testing (hacking), and was an early team member of the first U.S. National Computer Security Center. Paul has authored national and international policies and publications/books on information security.
Paul earned his M.B.A. in Corporate Finance from the University of Pennsylvania Wharton School of Business, and an M.P.A. in International Policy from Harvard University. His undergraduate degrees are from the University of North Carolina, a B.S. in Mathematics and a B.A. with Honors in Psychology.
No Events Are Currently Scheduled due to COVID-19.
Let’s start a conversation. Please complete this short form and send us a message.