Today's security market is full of "blacklist" solutions. These products are touted as "advanced threat analytics" or "threat detection services." While these products do provide some security, they are reactive in nature - retreating into your network and assuming strangers are already in. Only after the bad actors penetrate your network do these tools attempt to find them.
This wait-and-catch system works, but only for so long and only to a certain degree. Every year, the world produces more data than all previous years combined. That is incredible, exponential growth.
This growth of data means "threat analytics" is not a sustainable defense. If you aren't already, you and your business will soon be drowning in threat data. These tools won't help you prevent attacks because these tools have given up on prevention. They are reactive. Once all of your proprietary data has left your network, that's when these tools will step in and tell you exactly how it happened. Congratulations... with these tools, you can learn how to prevent the last attack, not the next one.
To make matters worse, many of these companies are taking your data outside your control, tracking your users and tracking your users' devices and then selling that data back to you. Do your customers know about this? If they did, would they still use your product?
REL-ID is different. REL-ID strengthens the edge of your network and extends that strength all the way to the application layer inside the client device. By only allowing whitelisted combinations of applications, users, and devices, REL-ID can prevent some of today's most prevalent attacks. In fact, the whole attack surface changes with REL-ID.
This shift in architecture, driven by our new REL-ID RMAK protocol, protects your users and your applications from the open web. REL-ID is reshaping the network attack surface.