Challenge of data protection

Yes, data protection is tedious. Enforcing it in your IT architecture involves numerous stakeholders, blocks resources and requires new skills and approaches. For example: shifting data from on-premise to private/public cloud systems requires a re-inspection and gap analysis of your assumed threat model. Multiple data owners per device challenge the assumption that we can design larger systems, which operate in "safe and secure" environment, while being available “online” at all times. Increasingly, data sovereignty is on the agenda of the industry to protect intellectual property (i.e. trained AI algorithms), customer data (i.e. GDPR) and to keep up data provenance and data reduction.

Learn more about Zero Trust!

Security & Privacy by design

As enterprise architects with a special interest in global data communication we have developed the first open-source messaging protocol that is decentralized and comes with highly-automated security and privacy by design. For instance, we use digital identities to establish security, and additionally we use hash values to obfuscate your identity and to protect your privacy.

The best thing: We all have it in us! We named it after the fibrous network of tissue, which forms the gray matter in our brain. The biological neuropil facilitates networking between individual cells. In the same way Neuropil® assures the stable and secure communication between machines and applications. Neuropil® messaging layer reduces IT costs, maximizes availability, and increases reliability. The utilization of Neuropil® is diverse and can be implemented in all communities and organizations dealing with highly sensitive information, i.e. the healthcare industry.

Schedule a demo

Technical details

The Neuropil® messaging layer is a c-library, which is locally installed and embedded into your own application or devices. The lean messaging library is developed with two layers of encryption (transport and end-to-end). Neuropil gives each system involved a digital identity to avoid unauthorized access. All connected systems can be addressed distinctly through their digital identity. Data exchange is individually defined and controlled via attributes. Due to these cryptographically secured attributes data misuse is nearly impossible.

A main benefit of Neuropil’s decentralized approach is reliability. In case one actor in the system goes down, another party is addressed to „jump in“ and communication continues smoothly. In the decentralized network any party can be reached, even if there is no direct connection. Traditional messaging systems cover the horizontal value chain within a single enterprise and its internal connections. Neuropil can work throughout different organizations and systems, greatly reducing legislative burdens. At the same time, communication channels can be governed centrally. This offers great potential in the multi-tenant environments we are working in and opens the door for new collaborative business models.

Get Started!