forked from WoTTsecurity/wott-io
-
Notifications
You must be signed in to change notification settings - Fork 0
/
about.html
113 lines (97 loc) · 6.55 KB
/
about.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
---
layout: default
current: page
title: About
class: 'about-template'
---
<div class="bg_logo_header">
<div class="centred_data">
<span class="t_h1">About Us</span>
<span class="t_h2">Empowering developers to build hardware with security in mind.</span>
</div>
<div class="white_shadow_block block_mini_info">
<div class="headers">
<span class="t_i1">All devices should have these core security features</span>
<span class="t_m2">WoTT aims to improve the security posture of devices with a simple solution for developers.</span>
</div>
<div class="icons_block" data-slide-active="1" data-slide-count="4">
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/ab_layers.svg);"></div><span class="t_custom">Make transport layer encryption a standard practicle in IoT like web.</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/ab_crypto.svg);"></div><span class="t_custom">Provide a cryptographic identity for every device</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/guard.svg);"></div><span class="t_custom">Quantify each device's trustworthiness and security hygiene</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/code.svg);"></div><span class="t_custom">Provide a seamless method to incorporate security during product development with minimal impact to code velocity</span></div>
<div class="visible_slide"><span></span><span></span><span></span><span></span></div>
</div>
</div>
<div class="persons">
<span class="t_i1">A Knowledgeable Team Ready to Help</span>
<span class="t_i2">WoTT is a free, automated, open-source public key infrastructure for connected hardware</span>
<div class="item_list">
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/al_esmail.webp);"></div>
<div class="informs">
<div class="name">Al Esmail</div>
<div class="workname">CEO</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/al-esmail/" target="_blank"></a></div>
</div>
</div>
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/viktor_petersson.webp);"></div>
<div class="informs">
<div class="name">Viktor Petersson</div>
<div class="workname">CTO</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/vpetersson/" target="_blank"></a></div>
</div>
</div>
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/abdur_rafey_masood.webp);"></div>
<div class="informs">
<div class="name">Rafey Masood</div>
<div class="workname">Engineer</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/abdur-rafey-masood/" target="_blank"></a></div>
</div>
</div>
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/dominique_guinard.webp);"></div>
<div class="informs">
<div class="name">Dom Guinard, Ph.D</div>
<div class="workname">Advisor</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/domguinard/" target="_blank"></a></div>
</div>
</div>
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/elad_verbin.webp);"></div>
<div class="informs">
<div class="name">Elad Verbin, Ph.D</div>
<div class="workname">Advisor</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/elad-verbin/" target="_blank"></a></div>
</div>
</div>
<div class="item_person">
<div class="photo" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/images/photo/kousha_najafi.webp);"></div>
<div class="informs">
<div class="name">Kousha Najafi</div>
<div class="workname">Advisor</div>
<div class="social_network"><a class="linkedin" href="https://www.linkedin.com/in/kousha/" target="_blank"></a></div>
</div>
</div>
</div>
</div>
<div class="white_shadow_block block_mini_info bottom_custom_padding">
<div class="wff_70">
<span class="t_hm">our principles</span>
<span class="t_i1">We raise the bar in security for cyber-physical systems</span>
<span class="t_i2">We believe that following these principles will provide the most robust and efficient security solutions</span>
</div>
<div class="icons_def">
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/open_source.svg);"></div><span class="t_m1">Open source</span><span class="t_m2">Transparency, peer audit and crowdsourced vulnerability reporting are the future. Security by obfuscation means there are fewer eyes on the problem and users have no idea that vulnerabilities exist.</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/secure_by_design.svg);"></div><span class="t_m1">Secure by design</span><span class="t_m2">Security belongs directly in the device not just on the users’ network. Some burden of security should be on the technology provider not the user alone. In fact, the best security does not rely on the end user at all.</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/shift-left.svg);"></div><span class="t_m1">Shift-left</span><span class="t_m2">The cheapest and most efficient way to include security is during development rather than during security audits after the build is complete. It requires upskilling and new tooling, but devs are capable people - let’s give them the opportunity to shine.</span></div>
<div class="info_block"><div class="icon" style="background-image:url({{ site.url }}{{ site.baseurl }}assets/style/img/zero_trust.svg);"></div><span class="t_m1">Zero-trust</span><span class="t_m2">Networks are not impenetrable. Perimeter security is a false sense of security. Assume the network is hostile and take measures to authenticate and encrypt every transmission.</span></div>
</div>
</div>
<div class="blue_block"><div class="vertical_aligner">
<span class="t_h1">Ready to ship secure devices?</span>
<span class="t_h2">Free credential manager for unlimited devices and simple packages for Security Console</span>
<a class="button_breeze_m" href="{{ site.url }}{{ site.baseurl }}pricing">view plans</a>
</div></div>
</div>