Provenance, governance, and immutability are tough technical challenges requiring expertise in digital identity, networking, and cryptography. RKVST™ provides simple APIs and UI to implement these in your application at a fraction of the cost and complexity of building and maintaining it yourself.
Collaborating with partner organizations often means federating ID services, or bringing guest accounts into your infrastructure.
Not with RKVST. With RKVST you remain in control of your identity and sign in the way you’re comfortable.
RKVST assembles and curates a complete lifecycle history of your shared assets enabling rapid insights and queries into “who did what when”, available as a simple UI search or a detailed JSON document.
Enable powerful insights from simple rules. Did things happen in the correct order? Did they take too long? Have we missed a software patch in a remote location?
Using the power of Asset Histories and simple rules-based policy configuration RKVST can highlight where your problem spots are so that you can focus your work where it’s needed.
At the heart of RKVST is a powerful policy engine that controls and audits “who can do what” and “who can see what”.
Discover RKVST for yourself
Achieve provenance, governance, and immutability for your shared data with none of the costs, distractions and diversions.
Postman Configuration for RKVST
We’re very pleased with our Python SDK, Jupyter Notebooks, and our OpenAPI Developer Console but sometimes we all want a bit more fine control or command chaining than those can offer. One of my favourite tools…
Tracking the transport of radioactive sources with blockchain
This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing…
Turning raw data into golden evidence: the magical power of attestation
What’s in a name? Attestation vs data, claim, statement, etc There are already so many words and concepts in information security: why do we need another one? And indeed ‘attestation’ is already used in several industry…