See how RKVST makes it easier for businesses to share data in these real-world examples.
Accelerating sensitive supply chains
Bridging the Trust Gap in nuclear waste handling
Together with Digital Catapult, the UK authority on advanced digital technologies, Sellafield was looking to evaluate novel solutions that could create a trusted and secure record for tracking hazardous waste and materials throughout the nuclear industry.
Sellafield chose RKVST for its ability to accurately represent physical handling lifecycles in a high integrity record that provides reliable access to all stakeholders to do their job with minimal disruption to existing systems and processes. Through RKVST track-and-trace of waste assets, Sellafield and Digital Catapult forecast significant cost savings and handling speed improvements with vastly increased reliability and data accuracy.
- Know your things
Complete traceability of provenance, operations, and maintenance for the life of the asset wherever it is
- Minimize transcription errors
Consistent physical-to-digital mapping means all stakeholders know they’re dealing with the right items, and a single source of truth eliminates the use of stale, incorrect, or mistyped data
- Integrate with existing systems
Get the benefits of Blockchain without major disruption to software systems and processes
Zero Trust IoT Devices
Advanced Zero Trust authorization
The modern approach to cybersecurity is Zero Trust: don’t place all faith into a single component, rather continuously verify trustworthiness for every authorization.
Typical IoT solutions & devices rely on standard approaches to authentication, such as PKI certificates, to verify device identity and trust devices. However, many other systemic issues such as firmware bugs, cloning, or missed maintenance SLAs can mean the device and its data are not trustworthy and pose a threat.
Device Authority chose RKVST for its ability to gather and distribute the trustworthy supply-chain-wide security and maintenance information that is essential to making reliable real-time zero trust authorization decisions where the compromise of legitimate devices poses a threat.
- Controlled SBOM distribution
Complete traceability of device software provenance, but only for those who need to know.
- Advanced composition analysis
SBOM is just the start: knowledge of where the software is deployed, how it has been handled, and whether it is up-to-date fuels higher quality decisions
- Reduce IoT risk
Automated Zero Trust decisions underpinned by checks on SBOMs and other lifecycle events reduce the risk of compromised devices entering your network.
Trust Your Digital Operations
Powering Product-as-a-Service Digital Transformation
Siemens Drive Technology issued a Global Challenge to find solutions that would enable the confident launch of a “motion-as-a service” digitally transformed business model where customers pay for the motion delivered rather than buying capital equipment.
Siemens chose RKVST for its capabilities in assured collaborative operations. The platform’s distributed architecture, data integrity features, and flexible user authentication enables all stakeholders to share the right data at the right time. This aligns incentives for reliability and service delivery for customers and better operational data and profitability for Product-as-a-Service providers.
- Know your things
Complete traceability of provenance, operations, and maintenance for the life of the asset — even after exchange or transfer
- Find and fix faults fast
Near real-time insight into process breaches across the supply chain: less time searching, more time doing
- Boost your digital transformation
Automate digital business processes with confidence in your data and trust throughout the value chain
Turn Chain of Custody into Chain of Responsibility
Bringing Trust to Digital Twins for Construction
Lendlease needed deep and dependable supply chain traceability of construction materials in order to automate and digitize the building design and approval process with trusted digital twins replacing paper and signatures.
Lendlease chose RKVST due to its distributed architecture, data integrity features, and simple code integration which enables confidence that the physical supply chain matches the digital model and unlocks the power of Digital Twins for designing the built environment.
- Automate CM processes
Proof-of-compliance at every stage gives confidence in fast changes and rapid iteration while ensuring accountability for externals
- Prove faulty parts & suppliers quickly
With a detailed trusted and traceable history, problems can be quickly resolved and dangerous flaws remediated before things go wrong
- Keep familiar tools and processes
API-first approach enables integration of RKVST behind existing procurement and supply chain tooling. Minimal disruption for customers and suppliers
Accountability for connected buildings
“Watching the Watchmen” for Building Access Management
Wavestone needed to deliver strong regulatory oversight of overridable electronic door locks. The evidence trail required the highest levels of integrity while preserving personal privacy for building residents. Once solved, this offered the ability to expand usage of convenient access while proving the highest level of trustworthiness to citizens.
Wavestone chose RKVST as the trustworthy transparency platform their customer needed. The platform’s secure, privacy-first data sharing features gave them the strong evidence trail that all stakeholders needed, while its cybersecurity supply chain traceability features massively cut the cost and time to prove compliance, integrity, and provenance of that data.
- Know your things
Complete traceability of provenance, operations, and maintenance for the life of the asset and the data underpinning digital transformation
- Justify authority & increase customer trust
Adopt a transparency-first approach to super-user capabilities opening operational opportunities through strong accountability
- Deter abuse
Ensure all use is permanently recorded and abuses can be found early, boosting confidence in remote and shared digital operations
How can blockchain solve supply chain visibility, auditability and compliance challenges? PA Consulting recently joined forces with RKVST to host a Hackathon, looking to identify new and innovative propositions for digital supply chains. Could the teams…
Supply chain risk continues to make headlines, from Solarwinds and Kaseya to last week’s announcement of a patch for the OpenSSL vulnerability, and the latest cybersecurity review from the U.K.’s National Cyber Security Centre highlights the serious…
Question: Software is only secure until it isn’t, then what happens? Last year the Log4J vulnerability perfectly illustrated how properly shared SBOMs would have helped users find and mitigate the “vulnerability of the decade”. And over…