How It Works
Zero Trust operations delivered through strong provenance and the power of knowing who did what when.
See RKVST explained in 1 minute
The Power of RKVing
Trust is in the eye of the beholder. Everyone has different priorities and different risk appetites. Every decision has to be made in the context of the moment. But one thing is common: all judgments are improved if they can rely on strong historical data.
By keeping a complete and untampered record of “who did what when”, RKVST™ journals the life history of shared assets and attests to their provenance to enable all stakeholders in connected processes to make their own unique risk calculations.


Control in the Right Hands
Traditional data security products often overlap business and technical concerns, forcing business stakeholders to learn data and programming concepts and developers to take more than reasonable responsibility for encoding business rules in code.
RKVST sets both stakeholders free by providing a simple set-once policy definition interface for business and compliance teams, and a powerful write-once REST interface that allows software integration teams to read and write the data they need without having to worry about data availability, distribution policies, or hard details of cryptography.
One API, Flexible Data Protection
Crucial to maintaining faith in integrity, transparency and trust systems is the concept of immutability: once something has been said it can’t be un-said; once accountable, always accountable.
As part of its hybrid architecture RKVST uses blockchain to ensure immutability of supply chain history, and gives you the tools you need to ensure that nothing you see has been modified, back-dated, or shredded, even by the RKVST service itself.
Achieving this immutability with blockchain would traditionally involve a complex set of trade-offs between cost, speed, and size of transactions, but RKVST makes that easy by having flexible options to suit most situations, all through the same API: from fine-grained individual transactional protection to high-efficiency batching and anchoring.

Get Free Access to See For Yourself
Achieve provenance, governance, and immutability for your shared data with none of the costs, distractions and diversions.
Recent Posts

Tracking the transport of radioactive sources with blockchain
This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing…

Turning raw data into golden evidence: the magical power of attestation
What’s in a name? Attestation vs data, claim, statement, etc There are already so many words and concepts in information security: why do we need another one? And indeed ‘attestation’ is already used in several industry…

Ridgeline Founder Stories: Rusty Cumpston and Jon Geater of RKVST aim to weave trust into digital supply chains
When it comes to supply chains, people used to establish and maintain trust manually. Now in the digital age, as we move towards globalization, that’s no longer scalable nor reliable. Rusty Cumpston and Jon Geater saw an opportunity to…