The Gradient Cybersecurity Mesh (GCM) Platform

Gradient Cybersecurity Mesh (GCM) is a true zero-trust solution that stitches together hardware-based roots of trust with nation-state hardened software to eliminate the threat of credential-based cyberattacks. In addition, GCM creates a frictionless and passwordless user experience without requiring any changes to your existing infrastructure. GCM is built around 4 core innovations:

Anchored, Time Boxed Ephemeral Credentials

Make the switch to time boxed credentials, anchored to devices using hardware roots of trust to ensure identities can’t be compromised

Continuous Attestation From Silicon to Application

Continually monitor platform integrity from hardware, firmware, OS, and application layers to ensure they are not compromised

Nation-State Secure SaaS Infrastructure

Highly secure SaaS software core capable of defending against nation-state level attacks, ensuring your credentials and access control policy operations are never compromised

Quantium-Ready Crypto-Agile Bootloader

Enables secure remote upgrades to new quantum resilient cipher suites for virtually any system

Gradient By The Numbers

22

Patents

40

Patents Pending

40

Trade Secrets

13,000

Hours of Security Testing

*Source: Gartner

TRANSFORMATIONAL START UP

Exceptional Company with a Deep Moat of Technology

  • Founded in 2018 by 3x proven entrepreneur Christian
    Wentz
  • $10M in funding from VC pioneers and HNW tech
    leaders
  • Validated by U.S. DoD and selected to build Zero
    Trust cybersecurity & quantum resistance for U.S.
    DoD assets
  • Paid Pilots Initiated with Fortune 500 flagship brands
  • Commercial LOIs Secured for Production Installs
    worth >$10MM (FY’23)
  • Winner 2022 MassTLC Tech Top 50 for Cyber, vs
    Akamai, NetScout and CyberArk
  • General Availability for Gradient Cybersecurity Mesh
    Q1 FY’23

How Gradient Cybersecurity Mesh Works

1

Secure Credential Issuance

Secure credential issuance and policy management leveraging GCM’s secure enclaves, provide nation-state level protection for credentials

2

Credential Rotation

Ephemeral, timeboxed credentials limits dwell time, making it difficult for an attacker to exploit a system or device before losing access

3

Anchoring

GCM leverages device anchoring to ensure that credentials cannot be used on an attackers device, shutting down remotely executed credential-based attacks

4

Attestation

GCM is the only solution on the market that continually monitors the identity and integrity of the device including PCR values at the hardware layer, firmware, OS, and application layers

IAM Tools Are Plentiful,

But They Haven’t Stopped Breaches

Problem: Ultimately, every IAM solution on the market today can be defeated by an attacker because no solution is using anchored, ephemeral credentials combined with attestation

CREDENTIAL-BASED ATTACKS ARE EVERYWHERE

Nearly Every Major Breach Involves Credential Theft

Breach
Initial Attack Vector
Secondary Attack Vector
Golden Attack Vector
Solarwinds
Malware
Stolen Credentials
Stolen Code Signing Cert
Uber
MFA Hammering
Account Takeover
Escalation
Rockstar Games
MFA Token Replay
Stolen Session Token
Lateral Movement
EA Games
Malware
Stolen Slack Credentials
Privileged Access
Target
Malware
Stolen Credentials
Internal Network Access

Get Started Today!

Schedule a FREE, no-obligation consultation call with one of our cybersecurity experts.