Today's security market is full of "blacklist" solutions. These products are touted as "advanced threat analytics" or "threat detection services." While these products do provide some security, they are reactive in nature - retreating into your network and assuming strangers are already in. Only after the bad actors penetrate your network do these tools attempt to find them.

This wait-and-catch system works, but only for so long and only to a certain degree. Every year, the world produces more data than all previous years combined. That is incredible, exponential growth.

This growth of data means "threat analytics" is not a sustainable defense. If you aren't already, you and your business will soon be drowning in threat data. These tools won't help you prevent attacks because these tools have given up on prevention. They are reactive. Once all of your proprietary data has left your network, that's when these tools will step in and tell you exactly how it happened. Congratulations... with these tools, you can learn how to prevent the last attack, not the next one.

To make matters worse, many of these companies are taking your data outside your control, tracking your users and tracking your users' devices and then selling that data back to you. Do your customers know about this? If they did, would they still use your product?

REL-ID is different. REL-ID strengthens the edge of your network and extends that strength all the way to the application layer inside the client device. By only allowing whitelisted combinations of applications, users, and devices, REL-ID can prevent some of today's most prevalent attacks. In fact, the whole attack surface changes with REL-ID.

  1. Our RMAK protocol protects your assets from the web - only RMAK packets can even talk to the network. The rest are filtered at incredible speed and scale. This protects your Authorization Server from getting melted by DDOS floods.
  2. With the packets properly filtered, the next vector to flood your Authorization server is the login process. But the login process requires a pre-existing relationship (i.e., and approved application, user, and device combination). Login DDOS floods become exceedingly more difficult to coordinate.
  3. With the packets and login process restricted and dark to the open web, the only elements that sit directly in contact with the broader internet is the registration flow. Because the REL-IDgateway is a horizontally scalable soft-appliance, the registration process can be off-loaded into separate scalable assets. Moreover, our registration process includes industry standard bot-protection features. Even under the worst of circumstance, existing users would still be able to transact with your business, safe from the malicious activity of the open web.

This shift in architecture, driven by our new REL-ID RMAK protocol, protects your users and your applications from the open web. REL-ID is reshaping the network attack surface.