A New Supply Chain Security Solution

RKVST, a leading provider of supply chain integrity, transparency and trust, has announced a Free and subscription-based Team tier of its award-winning enterprise SaaS solution, allowing organisations of any size to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

RKVST claim their platform removes the mistakes and risks associated with the manual processes and paperwork involved in sharing data across organisations, enabling all partners in the supply chain to collaborate and work with a single verified source.

RKVST does this by capturing the identity of sources and origin of data, enforcing sharing and visibility rules with strong cryptography, and underpinning that with distributed ledger technology that prevents forgery, back-dating or shredding of evidence. Jon Geater, CTO at RKVST, said “With the RKVST Free tier, we are making our award-winning enterprise blockchain accessible to the mainstream market. Delivering integrity, transparency and trust to digital supply chains is now available to everyone with a single API call or a single click."

Cost and complexity have traditionally been barriers for unifying supply chain operations, making them the preserve of large government agencies and enterprises, and where small suppliers are often left out. 

This creates blind spots that increase security and business risks for the entire supply chain as well as significant amounts of human resource spent auditing and validating partner data. RKVST is changing all of that by delivering a range of service options to suit organisations of every size. 

  • RKVST Free provides DevOps and R&D professionals with a try-before-you-buy option, and a free-forever service for small businesses.
  • RKVST Team employs a pay-as-you-grow model for increased asset capacity, more features and more users per account tenancy.

Aerospace company SATAVIA is using RKVST to provide transparent continuous asset assurance for the complex and often opaque carbon offset market in the aviation industry. By enabling aircraft operators to forecast, prevent, quantify and offset surface warming caused by aircraft-generated condensation trails or contrails, aviation’s per-flight climate impact can be reduced by up to 60%.

SATAVIA started out using RKVST Free, transitioning to RKVST Team as their user and asset capacity needs increased. The launch of RKVST Free and RKVST Team comes at a time when the push to adopt solutions that build trust and transparency is moving at unprecedented speed.

You Might Also Read

Protecting Your Business From A Supply Chain Attack:

 

« Welcome To NATO - Finland’s Parliament Attacked
Cyber Training And The Skills Shortage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Verve Industrial

Verve Industrial

Verve specialize in providing software and services to help protect and secure critical industrial control systems.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.