Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

RKVST mitigating insider threats demo

Mitigate insider threats with RKVST. This demo is an example of how with RKVST it's quick and simple to identify who did what when to any asset so you can quickly see if there has been any malicious activity, when it happened and who was responsible. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.

Instaproof in action! Drag. Drop. Verify!

Will demonstrates how easy it is to use RKVST Instaproof to verify the authenticity of a document. With Instaproof, you can drag and drop any file to instantly verify its origin, so you can make informed decisions about whether to trust it or not. Instaproof is perfect for anyone that wants to ensure the authenticity and provenance of their data, whether it's for regulatory compliance, intellectual property protection, or just good business practice.

RKVST Instaproof - instant data provenance

Drag. Drop. Verify! Instantly verify the origin, provenance and authenticity of any file with a simple drag and drop. Quickly identify fraudulent or modified data, or data of unknown provenance. RKVST Instaproof is the fastest way to instantly prove who did what when for any digital asset. Connects with your existing data – on premises or in the cloud including Dropbox, OneDrive and Google Drive.

RKVST Track and Trace Demo

This demo is an example of how RKVST was used to collect information from different databases and different suppliers to form a single source of truth for the full lifecycle of an asset - which in this case is a disposal container for nuclear waste. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.

RKVST - the Archivist of the modern internet

RKVST (pronounced Archivist) is an evidence platform that delivers a reliable chain of custody for supply chain data. It proves and verifies who did what when to any asset in the supply chain which can then be shared with supply chain partners. Jon Geater , Chief Product Officer, talks about RKVST at InfoSecurity Europe, London, June 2022.

Bridging the trust gap in connected supply chains

In these ultra connected times we increasingly need to share data between organizations. But how can you trust data that’s been generated outside your boundary walls? By another organization or a machine? That’s the trust gap, and that’s where RKVST comes in. Instead of bridging that gap with manual processes, verifying and auditing every document, RKVST takes that same risk management approach but automates it so you can trust the data, documents supply chain information at scale.

How zero trust helps reduce risk in connected supply chains

What is zero trust and how does a zero trust approach helps reduce risk in connected supply chain decision making? Find out how RKVST helps automate the tracking and sharing of supply chain evidence you can rely on, by integrating with the tools businesses already use today. Jon Geater and Rob Brown from RKVST discuss zero trust at InfoSecurity Europe, London, June 2022.