(Update Jan. 15, 2018: Unbound Tech was previously known as Dyadic and thus all mentions in the Gartner Hype Cycle reports were made under the name Dyadic.)
Multiparty Computing (MPC) has been recognized by Gartner as an emerging technology, with Dyadic mentioned as applying revolutionary breakthroughs in mathematics to break the boundaries of hardware and still achieve the highest level of security to solve real-world encryption, authentication, privacy and key protection challenges. Dyadic uses the mathematical principles of MPC to create a pure-software virtual Hardware Security Model (vHSM), a compelling alternative to traditional hardware in safeguarding secrets and enabling trust-contingent operations.
MPC is now starting its ascent in the “Innovation Trigger” in the Hype Cycles of Identity and Access Management Technologies, Privacy and Data Security. Gartner states that “multiparty computing shows potential as a method of cryptography that can allow people, devices and apps to work with data while keeping the data in a protected, confidential state.”1
Dyadic Security was named in four Gartner Hype Cycle reports this year:
- “Hype Cycle for Identity and Access Management Technologies, 2017″1 (“Multiparty Computing”)
- “Hype Cycle for Cloud Security, 2017″2 (“KMaaS”)
- “Hype Cycle for Privacy, 2017″3 (“Multiparty Computing”)
- “Hype Cycle for Data Security, 2017″4 (“Multiparty Computing” and “KMaaS”)
Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of specific business goals.
According to the “Hype Cycle for Data Security, 2017,” Gartner says “Multiparty computing (MPC) is a method of cryptography that enables entities (applications, individuals or devices) to work with data while keeping that data in a protected, confidential and private state. Specifically, MPC allows for multiple parties (i.e., users) to share data while maintaining confidentiality without exposing encryption keys… the application of MPC also extends also to cloud security, for example balancing a single-point-of failure risk regarding a cloud service provider’s environment. MPC can empower cloud key management with the ability to “split” cryptographic keys, in a manner such that it ensures protection and privacy in the cloud.”
The Hype Cycle report also finds that MPC can be applied to the following enterprise use cases:
- Encryption key management
- Cryptographic key protection
- Scalable software-defined hardware security modules (Virtual HSMs)
- IoT security
- Blockchain security
- Cloud computing (confidentiality with data in a cloud)
Fortune 500 enterprises with the highest security and privacy requirements have already turned to Dyadic to deploy solutions that address encryption key protection & management in hybrid on-prem/cloud environments, authentication, identity & access security, etc. Earlier this year, Dyadic closed a $12M Series B funding round led by Goldman Sachs Principal Strategic Investments, and joined by Citi Ventures and Eric Schmidt’s Innovation Endeavors.
While MPC has been the subject of theoretical research for several decades, Dyadic is pioneering the first enterprise-grade application of MPC to secure trust-contingent scenarios for commercial use. At the heart of Dyadic’s lie sophisticated applications of Multi-Party Computation (MPC), developed by Dyadic’s co-founders, Chief Scientist Prof. Yehuda Lindell and Prof. Nigel Smart. Lindell and Smart are among a handful of cryptographers across the world to master MPC’s theoretical and practical applications.
Dyadic’s vHSM technology takes secrets, whether they be crypto keys, private biometric identifiers, or sensitive company data, and splits them into parts that are continuously randomized and placed in separate locations. Once Dyadic splits secrets, they are never again united, completely eliminating the single point of failure for your most sensitive assets. To use the secret, Dyadic implements MPC to compute it from its fragments without unifying it, in a method mathematically proven as highly resistant to a breach or hack. The Dyadic vHSM allows organizations to create, use and manage encryption keys securely throughout their lifecycle with the strong security guarantees that were previously only available through the use of dedicated hardware.
“We feel that Dyadic’s inclusion in the four Gartner reports reflects how Multiparty Computation, the technology behind Virtual HSM, is emerging as a powerful, game-changing technology being used in more and more security and privacy applications,” said Avner Mor, Dyadic’s CEO and Co-Founder. “The amount of market interest in Dyadic’s vHSM technology is overwhelming. As the privacy and security in the cloud has become significantly essential to enterprises, the interest in our solution is significantly increasing.”
- 1Gartner “Hype Cycle for Identity and Access Management Technologies, 2017” by Gregg Kreizman, July 5, 2017.
- 2Gartner “Hype Cycle for Cloud Security, 2017” by Jay Heiser, July 17, 2017.
- 3Gartner “Hype Cycle for Privacy, 2017” by Bart Willemsen, July 20, 2017.
- 4Gartner “Hype Cycle for Data Security, 2017” by Brian Lowans, July 28, 2017
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.