Select Page


A universal and open source method to correlate security logs using blockchain technology would significantly change the global IT security landscape. This solution allows smaller companies to afford advanced security solutions previously out-of-reach, due to high costs.

  • I2 Progress 10% 10%
  • P2 Progress 0% 0%
  • E2 Progress 0% 0%

I2: Idea Incubation Phase

P2: Project Planning Phase

E2: Enterprise Execution Phase

More information available on the website: