Home Product Solution Technology About Contact









Add modern security to your applications



Drop your application into our Security Container to use hardware backed security and assurance controls






Deploy Anywhere

The eCora Security Container can run on any device on premises, in the cloud, at the edge and even offline


Prevent Theft and Leaks

Container remains encrypted even in use so neither the user, cloud provider nor eCora can see inside the container


Keep Data Private

All data sent to and received from the container remains encrypted using post quantum hardware backed keys








Product



The eCora Security Container uses technology innovations in cybersecurity, trusted computing, and confidential computing





Encrypted Container

Encrypt existing applications or native Wasm modules into a secure container.  Confidential Computing technology is used to ensure the application remains encrypted while executing


Policies and Rules

Define policies and rules which are checked before and after every execution request.  These can be used to control anything such as access rights, limits, quotas and even calculate billing


Easy Deployment

Build the application as usual using your existing tools and then use eCora to quickly encrypt it into a container.  This eCora container can then be deployed anywhere on the customer's IT estate




For AI Developer/Vendor

Do you have customers who want to install your model in their IT estate?  Are you concerned about your valuable model IP being stolen?

Ship your model to your customers as an API enabled encrypted container with policies and rules to control access


For AI User/Customer

Are policies or regulations stopping you from using external AI SaaS services?  Are you concerned that your data may leak if you use the cloud?

Deploy a vendor's encrypted AI model into your IT estate knowing your data cannot be seen by anyone else






Solution



The eCora Security Container is ideally suited for regulated and classified industries that require the highest security and assurance controls




Healthcare


 

Maintain patient data confidentiality

Healthcare AI usually trains models on special data sets that are either anonymised or synthesised to protect patient confidentiality.  Healthcare organisations struggle to keep these data sets up to date and relevant

eCora allows healthcare AI to send real data without the risk of leakage

Cybersecurity


 

Keep network traffic inside the perimeter

Anomaly and intrusion detection software is increasingly using AI to cope with the variety of cyber attacks that occur today.  Enterprises however, don't want to send their internal network packets and logs to external services

eCora allows vendors to securely deploy their encrypted IP on customer premises

Financial Services


 

Safely aggregate transaction data

Fraud and money laundering AI services are heavily used today but because of regulations, PII must be stripped out which means they cannot correlate information across different companies to better detect illegal activities.

eCora allows encrypted data sharing where no-one can see the real data

Manufacturing


Confidential computing AI at the edge

Advanced manufacturing are using AI for predictive maintenance and process optimisation however, many want edge computing capabilities because their factories are air-gapped to protect their process secrets and data security

eCora uses a decentralised edge architecture that works offline






Technology



The eCora Security Container is a Secure By Default platform that uses hardware assisted security and assurance controls deep in the stack





"Security as a forethought, not an afterthought"





Secure By Default Architecture

Secure By Default is the successor paradigm to Secure By Design.  Our Security Container has built-in security and assurance controls at the core of the stack which are automatically applied and cannot be bypassed

The stack can containerize an existing application such as an AI model or run natively written Wasm modules

Hardware Backed Security

Our stack goes all the way down to silicon.  The stack base layer uses encrypted enclave technology, with keys generated and retained in secure elements (TPMs) which mean they cannot be extracted or compromised.

Every activity that goes on in the stack must be signed by a secure element and the stack automatically attests that all requests come from a legitimate secure element

Decentralised Edge Computing

Edge computing is the successor paradigm to Cloud computing and has better scalability and resilience.  Our stack is written as edge native code using Rust and Wasm.

The decentralised architecture of the stack means that the nodes in our network we can work in offline mode

Data Centric Security

Data Centric Security is the successor paradigm to Network Centric Security.  The stack implements fine-grained Zero Trust at the individual data record level.

Each data record object is a self-contained unit of security containing its own keys, roles, permissions and functions






About Us



David Chan and Tom Whelan have both had long careers building large complex systems, and in 2018 began looking at the latest advances in the areas of security, scalability, and resilience.  The aim was to improve the security of application software stacks.  Applications are developed with security as an afterthought and even then, the use of security is handcoded leading to mistakes.

What was needed was a software stack where security was not only built-in to the stack, but was placed at the base layer so that it is given the highest priority and can control the whole stack.  This Secure By Default approach would provide security controls automatically.

Retrofitting an existing stack with a security base layer didn't work because they are such different paradigms so the only course of action was to develop a new runtime computing stack.  Along the way, new innovations were developed such as a fast scalable blockchain that utilises edge computing.

Eventually, in December 2020, the company eCora (eCoraDLT Limited) was incorporated in Leicester, United Kingdom and received angel funding in early 2021.  In November 2021, eCora filed a patent on their efficient blockchain protocol which allows lower powered devices such as IoT and phones to run a layer one protocol.





Team



David Chan  
CEO & Cofounder
Tom Whelan  
CTO & Cofounder
Raphael Djondo  
Principal Engineer





Contact Us







eCora
LCB Depot
31 Rutland Street
Leicester LE1 1RE








For more information,
email  [email protected]






DASA Funded

       
Cyber Runway
Grow 2024