Building Operationally Mature Cyber Businesses

disruptiveOps

Iron Pipeline

 

We are actively seeking strategic partners to bring this cybersecurity solution to market.

Please watch the presentation and demo videos, provide feedback by completing the survey, and if interested in partnering, execute the related Mutual Non-Disclosure Agreement.

 
 
 

Securing Windows-based Software Supply Chains

Windows-based Software Supply Chains become vulnerable by intentional and unintentional means. Bad actors intentionally introduce malware, such as ransomware and spyware, via corrupted binaries. Unintentionally, binaries become vulnerable due to lack of maintenance required to maintain pace of new threats bad actors exploit within .NET frameworks and Microsoft languages.

Next generation cybersecurity tools must continuously authenticate and authorize individuals and actions. Iron Pipeline is Continuous Authentication of Executables.

Iron Pipeline secures the Software Supply Chain, particularly around the identification and cataloging of compiled binary executables and their embedded software libraries.

Executive Team

  • Jonathan Jenkins Solution Architect - MSc Information Technology, BS Computer Studies

  • Tam Tran – Business Specialist

  • Todd Boss – Data Architect

  • Amine Bourjeli – Software Engineer

  • Joe Booth – Software Engineer


Videos and Presentations

Presentation of Products & Company Overview with Audio

Walkthrough of Demonstration with Audio overlay

PDF of Showcase Presentation without Audio

 

Your Feedback

Please fill in the following survey, especially if you’d like to engage in a teaming or investor discussion.

Market validation

IP Protection

US Provisional Patent 62/546,458 (System and Method For Risk, Waste, and Opportunity Evaluation, Analysis, and Recommendation)