Real World Approach

Imagine telling a building lobby receptionist, "Please determine the intentions of everyone who enters the building, and also determine whether they are good or bad people." If you think that's an unreasonable request, and if you know how a building works, then you are better prepared to judge information security approaches than are the information security experts.

Determining the Threat

The current practice of information security is mostly about determining the intentions and character of the sender of a stream of bits.

Problem: in most cases that is impossible.

When it is possible, it's because the intruder lacks skills or funding. In other words, information security products tend to deter the least threatening attacks. That renders mainstream information security efforts ineffective or even useless.

The Authenticity Institute, working with its partners in the Authenticity Alliance, solve the problem that is at the root of security problems. That problem is inauthenticity.

We solve problems of inauthenticity by providing Authenticity.

The Solution

Identity is the Foundation of Security.â„¢
Let the members of The Authenticity Alliance help you make your information resources secure and manageable by:

    • establishing measurably reliable identities, and
    • designing and building online spaces upon a foundation of reliable identity, PKI, and InDoorâ„¢ standards and practices.