Uppsala Security, maker of Sentinel Protocol, the first crowdsourced threat intelligence platform based on blockchain technology and A.I. It recently unveiled the release of TOMS, a product designed to meet the increased demand for on-premise solutions that meet the latest and most stringent legal requirements in the cryptocurrency space.
Similar to other tools in the Uppsala Security product suite, the On-Premise Management System (TOMS) of the Threat Reputation Database uses the Threat Reputation Database as the backbone (TRDB), a decentralized database that stores more than 56 million threat indicators.
The Threat Intelligence provided by the TRDB has a crowdsourcing architecture and enables users all over the world to access their verified data in almost real time and is well adapted to the requirements and specifics of the decentralized technology.
TOMS helps to minimize external communication and the attack surface.
TOMS is a local, centralized database for digital currencies that stores and provides data on wallet addresses for digital currencies provided by the Uppsala Security Threat Reputation Database (TRDB). This solution can be scaled up to provide additional data and run in isolation. The system can be hosted on a company’s secure network without connecting to external web services, allowing users to query data related to a cryptocurrency wallet and its risk profile.
Designed to be integrated with various products and financial applications, TOMS enables companies to proactively protect crypto assets from malicious threats, support confidential investigations, and meet the strictest legal standards that companies or government organizations use to access this type of information and solutions Their websites must host their own network environment. This is especially true for government agencies, financial institutions and financial software applications, which must comply with the strictest legal frameworks.
Main features of TOMS:
- Platform independent: TOMS can be integrated into any organization, its applications and services via a RESTful API.
- On-premise database system. Enables dynamic online access to the latest collective security intelligence data hosted in the TRDB without an active internet connection on a company’s internal computer network. The system can be completely offline or deployed with a DMZ to automate content downloading.
- Current threat intelligence data. Validated Crypto Wallet Addresses Related to Money Laundering, Terrorist Financing, Malware, Phishing, Fraud and Fraud.