We are actively seeking strategic partners to bring this cybersecurity solution to market.
Please watch the presentation and demo videos, provide feedback by completing the survey, and if interested in partnering, execute the related Mutual Non-Disclosure Agreement.
Securing Windows-based Software Supply Chains
Windows-based Software Supply Chains become vulnerable by intentional and unintentional means. Bad actors intentionally introduce malware, such as ransomware and spyware, via corrupted binaries. Unintentionally, binaries become vulnerable due to lack of maintenance required to maintain pace of new threats bad actors exploit within .NET frameworks and Microsoft languages.
Next generation cybersecurity tools must continuously authenticate and authorize individuals and actions. Iron Pipeline is Continuous Authentication of Executables.
Iron Pipeline secures the Software Supply Chain, particularly around the identification and cataloging of compiled binary executables and their embedded software libraries.
Executive Team
Jonathan Jenkins Solution Architect - MSc Information Technology, BS Computer Studies
Tam Tran – Business Specialist
Todd Boss – Data Architect
Amine Bourjeli – Software Engineer
Joe Booth – Software Engineer
Videos and Presentations
Walkthrough of Demonstration with Audio overlay
Your Feedback
Please fill in the following survey, especially if you’d like to engage in a teaming or investor discussion.
Market validation
IP Protection
US Provisional Patent 62/546,458 (System and Method For Risk, Waste, and Opportunity Evaluation, Analysis, and Recommendation)