{"id":1626,"date":"2024-03-20T20:54:54","date_gmt":"2024-03-20T20:54:54","guid":{"rendered":"https:\/\/web.blockframetech.com\/dev\/?page_id=1626"},"modified":"2024-11-18T17:34:07","modified_gmt":"2024-11-18T17:34:07","slug":"cyberdome","status":"publish","type":"page","link":"https:\/\/web.blockframetech.com\/dev\/cyberdome\/","title":{"rendered":"CyberDome"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">CyberDome\u2122<\/h2>\n\n\n\n<p>CyberDome\u2122 is a protected ecosystem of securely interacting products and services. The CyberDome\u2122 will consist of a family of products deployed to individual users or a geographically stationary grouping of products and services supporting a located service area. A CyberDome\u2122 is implemented through the\u00a0<a href=\"https:\/\/web.blockframetech.com\/dev\/security-products\">Eco-Secure Provisioning\u2122 (ESP)<\/a>\u00a0service, which is vendor, network, and location agnostic. Clients create a CyberDome\u2122, leveraging BlockFrame\u2019s IUR\u2122 service to set up requirements and credentials for secure interaction of each of their selected features. Registration criteria establish interaction uniformity with our CyberDome\u2122 customer specific standardized security artifacts defining their CyberDome\u2122 uniquely from others. The CyberDome\u2122 owners\u2019 specific artifacts are how participating service providers, content creation, and end system or user credentials are locked to the CyberDome\u2122 then enforced to comply with the CyberDome\u2122 owners established parameters.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To start your CyberDome\u2122 service, contact&nbsp;<a href=\"https:\/\/web.blockframetech.com\/dev\/contact-us\/\">BlockFrame\u00ae&nbsp;<\/a>to register your own CyberDome\u2122 specific artifacts and begin enforcing the security requirements for your participants. Upon setting up a CyberDome\u2122 participating service platforms, owners, content providers, edge Internet of Things (IoT) systems, or mobile applications will require registration in your CyberDome\u2122 to link each service, content item, or edge item. Security uniformity and services can be established within your CyberDome\u2122 to support the following interactive features and much more.<\/p>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center uag-hide-tab\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"361\" src=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/09\/securesoftware.webp\" alt=\"\" class=\"wp-image-3339 size-full\" srcset=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/09\/securesoftware.webp 600w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/09\/securesoftware-300x181.webp 300w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/09\/securesoftware-200x120.webp 200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><strong><em>Edge node peer-to-peer operations<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber defense in depth Zero-Trust between edge nodes<\/li>\n\n\n\n<li>Secure software and patching<\/li>\n\n\n\n<li>Signing data with proof of originating edge system or mobile application<\/li>\n\n\n\n<li>Local product synchronization for (network) peer-to-peer operations<\/li>\n\n\n\n<li>\u00c0 la carte purchases of services from competing vendors<\/li>\n\n\n\n<li>Direct edge node peer-to-peer economic operations<\/li>\n\n\n\n<li>Trusted document receipt and verification<\/li>\n\n\n\n<li>Smart contract features<\/li>\n\n\n\n<li>Logging immutable operations, proof of origin, critical events<\/li>\n\n\n\n<li>Zero-Trust verification for first engagement of unknown edge nodes<\/li>\n\n\n\n<li>Zero-Knowledge proofs for identity verifications<\/li>\n\n\n\n<li>Multi-Factor Authentication and Identification<\/li>\n\n\n\n<li>Edge system self-checking and configuration for proof of integrity<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized uag-hide-desktop uag-hide-mob\"><img decoding=\"async\" src=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/09\/securesoftware.webp\" alt=\"\" style=\"object-fit:cover;width:900px;height:300px\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group alignfull uag-hide-desktop uag-hide-mob is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-medium-font-size\" id=\"block-b7c5f1a4-c50d-4798-bf52-39a818221953\"><strong><em>Edge node peer-to-peer operations<\/em><\/strong><\/p>\n\n\n\n<ul id=\"block-68805acc-22a6-4ecc-be5e-c1bee802d36c\" class=\"wp-block-list\">\n<li>Cyber defense in depth Zero-Trust between edge nodes<\/li>\n\n\n\n<li>Secure software and patching<\/li>\n\n\n\n<li>Signing data with proof of originating edge system or mobile application<\/li>\n\n\n\n<li>Local product synchronization for (network) peer-to-peer operations<\/li>\n\n\n\n<li>\u00c0 la carte purchases of services from competing vendors<\/li>\n\n\n\n<li>Direct edge node peer-to-peer economic operations<\/li>\n\n\n\n<li>Trusted document receipt and verification<\/li>\n\n\n\n<li>Smart contract features<\/li>\n\n\n\n<li>Logging immutable operations, proof of origin, critical events<\/li>\n\n\n\n<li>Zero-Trust verification for first engagement of unknown edger nodes<\/li>\n\n\n\n<li>Zero-Knowledge proofs for identity verifications<\/li>\n\n\n\n<li>Multi-Factor Authentication and Identification<\/li>\n\n\n\n<li>Edge system self-checking and configuration for proof of integrity<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile uag-hide-tab\" style=\"grid-template-columns:auto 54%\"><div class=\"wp-block-media-text__content\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p><strong><em>Web Service to edge node<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Audit of any CyberDome\u2122 component as a service<\/li>\n\n\n\n<li>Forced security credential re-setting and routine augmentation<\/li>\n\n\n\n<li>Consumption as a service for end user service<\/li>\n\n\n\n<li>Distribution of software updates and patches<\/li>\n\n\n\n<li>Individualized file collection from any edge IoT or mobile application<\/li>\n\n\n\n<li>Individualized file delivery to any edge IoT or mobile application<\/li>\n\n\n\n<li>Transaction and event logging<\/li>\n\n\n\n<li>Requested real time self-checking and configuration auditing<\/li>\n\n\n\n<li>Analytics or reporting of risk related to deployed systems<\/li>\n\n\n\n<li>Analytics or reporting of document delivery, creation, and usage<\/li>\n\n\n\n<li>Remote authentication and identification of users<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1404\" height=\"618\" src=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2.png\" alt=\"\" class=\"wp-image-2467 size-full\" srcset=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2.png 1404w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2-300x132.png 300w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2-1024x451.png 1024w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2-768x338.png 768w, https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2-200x88.png 200w\" sizes=\"auto, (max-width: 1404px) 100vw, 1404px\" \/><\/figure><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter uag-hide-desktop uag-hide-mob\"><img decoding=\"async\" src=\"https:\/\/web.blockframetech.com\/dev\/wp-content\/uploads\/2024\/04\/BFT-Product-Portfolio-2.png\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group alignfull uag-hide-desktop uag-hide-mob is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-medium-font-size\" id=\"block-32a48c42-4fa2-4c0f-a1dc-dfdeb6887cce\"><strong><em>Web Service to edge node<\/em><\/strong><\/p>\n\n\n\n<ul id=\"block-9fb901de-71e1-4966-ac6a-3c5bb8395db5\" class=\"wp-block-list\">\n<li>Audit of any CyberDome\u2122 component as a service<\/li>\n\n\n\n<li>Forced security credential re-setting and routine augmentation<\/li>\n\n\n\n<li>Consumption as a service for end user service<\/li>\n\n\n\n<li>Distribution of software updates and patches<\/li>\n\n\n\n<li>Individualized file collection from any edge IoT or mobile application<\/li>\n\n\n\n<li>Individualized file delivery to any edge IoT or mobile application<\/li>\n\n\n\n<li>Transaction and event logging<\/li>\n\n\n\n<li>Requested real time self-checking and configuration auditing<\/li>\n\n\n\n<li>Analytics or reporting of risk related to deployed systems<\/li>\n\n\n\n<li>Analytics or reporting of document delivery, creation, and usage<\/li>\n\n\n\n<li>Remote authentication and identification of users<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberDome\u2122 CyberDome\u2122 is a protected ecosystem of securely interacting products and services. The CyberDome\u2122 will consist of a family of products deployed to individual users or a geographically stationary grouping of products and services supporting a located service area. A CyberDome\u2122 is implemented through the\u00a0Eco-Secure Provisioning\u2122 (ESP)\u00a0service, which is vendor, network, and location agnostic. Clients [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-1626","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"depicter-thumbnail":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Subhash","author_link":"https:\/\/web.blockframetech.com\/dev\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"CyberDome\u2122 CyberDome\u2122 is a protected ecosystem of securely interacting products and services. The CyberDome\u2122 will consist of a family of products deployed to individual users or a geographically stationary grouping of products and services supporting a located service area. A CyberDome\u2122 is implemented through the\u00a0Eco-Secure Provisioning\u2122 (ESP)\u00a0service, which is vendor, network, and location agnostic. Clients&hellip;","_links":{"self":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/pages\/1626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/comments?post=1626"}],"version-history":[{"count":68,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/pages\/1626\/revisions"}],"predecessor-version":[{"id":5029,"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/pages\/1626\/revisions\/5029"}],"wp:attachment":[{"href":"https:\/\/web.blockframetech.com\/dev\/wp-json\/wp\/v2\/media?parent=1626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}