Tampered IoT Data – The “fake news” of the Industrial IoT

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation. Tributech offers a data notary service that eliminates the risk of tampered IoT data and can be easily integrated in your data service or platform.

The term “fake news” has been around quite a while and describes the conscious misinformation to influence decision-making and beliefs of people.

In both our professional and personal lives, we make decisions all the time and of course we make mistakes. History shows us that even the best leaders sometimes make the wrong decisions. With the rise of fake news, however, there is a risk that the number of wrong decisions being made will reach unprecedented levels. This is because fake news goes far further than being a way to manipulate elections or sometimes expose unwitting consumers to hidden advertising messages.

As the global amount of information increases at an exponential scale, the access to enormous amounts of information makes it hard for people to verify sources and critically interact with the provided content. This is the reason why digital platforms are strongly criticized due to their global outreach, lack of validation and reference checks of posted content.

Due to the rise of technological opportunities within the Industrial IoT, the amount of available information is also increasing exponentially, and more and more companies are moving towards data-based decision-making to manage their business.

Data-Driven Business at Risk

Therefore, companies should be aware of the trend of conscious misinformation and the possible impact it can have when it begins to target IoT data. Tampered IoT data can cause tremendous harm to businesses as it is used for interpretations, decisions or actions triggered within a company – it may even put the safety of people at risk when security mechanisms are triggered by data inputs.

So, every company who already has established a data service or an IoT platform or is planning to do so, should be aware of these risks. We offer an out-of-the-box solution for ensuring origin and integrity of IoT data, even across company’s boundaries. This creates trust form sensor to consumer and provides an additional layer of IoT security.

Tamper-Proof IoT Data enabling Trust from Sensor to Consumer

In order to keep conscious misinformation out of your IoT-platform or data service you need an independent party at the data source that verifies origin and integrity of the data. The principle is equal to a notary in the physical world: A notary is an independent instance that verifies documents for your company.
As part of our DataSpace Kit, the DataSpace Agent operates as a data notary service that is located directly at the data source and verifies the origin and integrity. Hereby the DataSpace Agent creates cryptographic proofs of the data which are securely stored in a blockchain-based trust layer. This approach enables the verification of origin and integrity across systems and companies at any time – even of high-frequency data streams.

Why is this relevant for your IoT-platform, data service or new business model? Let’s say you have two connected machines – one is located at your supplier’s site and the other one in your factory. One machine is welding two pieces of metal together and the other one is supplying the metal sheets. The assembling machine used relevant input about the quality from the welding machine, for specific adjustments during the assembly process. If the welding machine provides wrong information about the quality of the welded parts, it might have an impact on the final product and its strength class. The production stop and the increase in rejects or claims would have tremendous consequences for the business. Now imagine the impact in a fully automated factory. Therefore, it is necessary to implement a data notary service into your system that verifies the origin and integrity of data in order to profit from the benefits of data services.


Working on a data service, new business model or IoT platform? Contact us for a first discussion as it might be at risk.

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.

Covid-19: Behind the mask

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.

A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings. Basically, nothing new popped up and everything was already part of previously published research and findings. However, the last few weeks and months demonstrated the difference in launching (digital) initiatives without clear purpose or because you really want to drive change in order to manage operations, build resilience to survive or even accelerate business.

Cross-company perspective

The past few months have shown us the benefits of digitization on the shop floor and how relevant it is, when trying to keep everything up and running in challenging times. For example, a high level of  automation on the shop floor helped to keep the production up and running with minimum or even without employees necessary on site. Accessing assembly lines in remote locations from your headquarter or from home did provide additional benefits for enterprises and supported resiliency

However, the crisis also showed us the limitations of today’s approaches – that the strength of a value or supply chain is not only dependent on the grade of digitization of one member but on the whole chain. Therefore, in future it will be necessary to think across the pond when digitally transforming businesses or value chains and include suppliers, partners and customers in your thinking and projects.

Establish & accelerate your data-driven business

Offering value-adding services to your products or even establishing new business models helps to diversify your business. For example, platform or subscription-based data services can decrease the volatility of a company’s revenue.
One especially interesting example in these challenging times is the Pay-per-Use approach. It can help a manufacturer to establish an additional sales channel, which does not impose a high investment barrier from a customer. On the other side the customer gets maximum flexibility, when scaling production up and down according to the volatile demand.

According to a Forbes study, 89% of the interviewed CIOs expect to have revenue-generating responsibilities and 2/3 of the CIOs in the manufacturing sector expect to head a profit center by 2025 and create new products/services contributing to the bottom line.

However, establishing and accelerating your data-driven business in a scalable and global way comes with several challenges that we, at Tributech, aim to address. I would like to highlight two of them which will increase in importance. The first is the so called “willingness to share” which is necessary when scaling your data-driven service or business model across your customer base. The other one is the trust in shared data from sensor to consumer for being able to rely on shared data which will be one of the key requirements for data-driven services and business models – no matter if the data is used for decision-making, documentation, triggering payments or referenced in legal agreements.

Managing data like corporate assets

As data is the necessary foundation for all of these mentioned learnings, companies need to derive a “data asset strategy” from their general company’s strategy in order to align management and handling of data with the future value creation process. This derived strategy will also help companies to better define data security & sharing policies, allocate data-related budgets and investments based on the strategy and it also assists in  demonstrating a true transformation to a data-driven future for all involved stakeholders.

At Tributech, we believe that a company’s strategy depends more and more on deriving value from data. The management, the board and also the investors should (and will) keep an eye on a new asset class – the data portfolio of the company.


Curious? Talk to us!

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.

Sharing data with other companies – a justified hype?

Sharing data with other companies – a justified hype?

Data sharing is fully in line with the trend. The concept is simple: two or more business partners exchange data with each other to ensure an optimized and flexible joint workflow. In an increasingly complex working environment with interdisciplinary cooperation and cross-company value chains, this is absolutely necessary to facilitate cooperation and optimize work processes.

However, despite its necessity, data sharing also brings certain disadvantages with it. Especially larger companies with conservative structures question the measures with great scepticism. This often leads to a very low willingness to share.

The biggest concerns with data sharing

Finally, data sharing also has some potential drawbacks – some of the biggest concerns, according to a study by PwC, are listed here.

Lack of security

For a reason do we call this fear first. Data sharing is often set up via central data pools where all participating companies can provide and access data. With central data pools, the participating companies have to hand over the security of their most sensitive data – and rely on an external provider. Many agreements on data sharing are already failing here. After all, it is difficult to find a data pool provider that meets the security standards of all participants. This problem becomes clearer when you consider that a huge amount of sensitive data can be accessed due to a single data leak in the data pool. Whose hands would you like to put such a responsibility in? 57% of the companies surveyed by pwc fear that their most important data and thus also important company secrets will fall into the wrong hands.

Lack of traceability

59% of the respondents stated that the lack of traceability of data access was a cause for concern. In concrete terms, this means that once the sensitive data has been shared with another company or uploaded into a data pool, companies can no longer trace who is actually reading their data and who is working with it.

Unclearly formulated responsibilities

In an estimated 99 out of 100 cases, there are no problems with data sharing, the participants are trustworthy, and the data is used properly. But what happens in this 1 case out of 100? Due to the lack of traceability, no one can really be held accountable – and the company is usually left with the damage whose data has been leaked. After all, there is only a very small chance that the real culprit can be identified. 55% of respondents said they were sceptical about responsibilities

Surrender of data sovereignty

All or nothing! When using a data pool, you do not have the detailed choice of which data you want to release at a specific time to whom. Rather, all data necessary for operation is always visible to all participants. You thus lose control over your important data streams.

Possibility of technical errors

A standstill in your production chain leads to delays, lower delivered quantities and ultimately almost guaranteed financial losses. That’s bad enough if the mistake happens in your company and part of your production stops for a few hours. Worse still, if the error happens at an external data pool provider, your entire production is stopped, and you can’t do anything about it. A horror scenario that can keep you awake.

Dependence on external suppliers

In general, dependency on an external provider is the biggest disadvantage of data sharing via a data pool. Its technical stability and security standards are one thing, but you also trust the provider in terms of its innovative strength and economic stability. These are a number of risk factors that, in the worst case, can lead to great damage in your company.

Data Sharing reinvented – how to avoid the fears of your cooperation partners

You now know some of the biggest concerns many companies have about data sharing. Would you dare to resolve all these concerns – and put your finger on the fact that the above issues will never occur?

No?

Then we can reassure you – because all of these problems occur exclusively with data sharing via a central data pool. We, at Tributech, therefore provide you a decentralized solution with which you can significantly increase the willingness to share data with your business partners – with the same flexibility, speed and all the technical features. Only one thing is omitted: the security gaps.

We rely on peer-to-peer data sharing for our customers. Data is not stored centrally on an external server – it is only exchanged between the two parties. In addition, only data that is actually needed for the next work process is exchanged, and only to the participant who needs it.

This is how you as a company ensure that …

… in the event of a data leak huge amounts of sensitive data can never be disclosed. Only those data can be tapped that were exchanged at the time of the hack.

… you always retain data sovereignty and only release data that is actually needed by your business partners.

… you are never technically dependent on an external provider – and the continuation of your production is entirely in your hands.

… even in the event of damage, you can trace who caused it. In this way you can identify sources of error and, if necessary, also hold the party responsible for the damage accountable. A specially developed module of our Tributech software makes this possible.

And last but not least: Your business partners will rather agree to exchange their sensitive data with you, if they are not dependent on any external provider and keep control over who gets to see their data.

In short: With a decentralized solution for peer-to-peer data sharing, you increase the willingness to share data with business partners over and over.


Curious? Talk to us!

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.

Why your company needs a “data asset strategy“. Do or do not, there is no try!

Why your company needs a “data asset strategy“. Do or do not, there is no try!

In the last decade, the number of times “data” is referred to as the new gold, oil, soil, etc. in presentations and conference talks have exploded. Additionally, the research firm “Gartner” predicts that by 2022 companies will be valued mostly based on their information portfolios.

Facebook, Google and other tech companies already understand the true value of data and consider it as their most valuable asset. Finally, more and more industries are also beginning to rethink their strategic view on data and how they can derive future business value out of it.

In the following blog post, you get to know why a “data asset strategy” makes sense for your company. We describe the motivation for upgrading your data to true corporate assets, what might be the possible requirements for that and also propose the 3 major data asset classes.

Data will be the #1 asset in a data-driven future

At Tributech, we believe that if a company’s strategy depends more and more on deriving value from data. The management, the board and also the investors should (and will) keep an eye on a new asset class – the data portfolio of the company.

Therefore, companies need to derive a “data asset strategy” from their company’s strategy to align management and handling of data with the future value creation process. It will also help to better define data security & sharing policies, allocate data-related budgets and investments based on the future strategy and demonstrate a true transformation to a data-driven future for all involved stakeholders.

Introducing 3 major data asset classes

Most executives refer to the different data sets available in their company as just “the data”, but in our opinion, it needs to be categorized into different data asset classes to really derive business value out of it.

There are 3 major asset classes which can be identified within a company:

  • Operative data: data that is necessary for operating the current business
  • Strategic data: data that can be used for deriving insights for new products or services
  • Monetizable data: data that is not of great value for the company but has a huge value for other stakeholders

Based on these 3 asset classes, companies can define responsibilities and internal priorities for optimizing the value out of each specific asset class.

The responsibility for operative data should be aligned with the ongoing value creation process for the current business operations. Strategic data is in the responsibility of the R&D department or the uprising digital offices. For monetizable data, the company can establish new revenue streams by trading this data with partners, suppliers, competitors or even publish them on data marketplaces.

Additionally, by “upgrading” their data to assets companies can use several asset classes as a security deposit or even capitalize it on their balance sheets in the future.

Possible requirements for qualifying data as an asset

In our opinion, there are several requirements that need to be met to qualify something as an asset from a business perspective:

  • Proof of ownership and origin: Data collected by IT systems needs to be auditable to verify its origin and uniqueness. If data is shared by 3rd parties, it needs to be synchronized based on a sharing agreement to document ownership.
  • Tamper-proofness: Need for data integrity checks across systems starting at the data source to monitor for unauthorized changes.
  • Share- or tradeable: For deriving value out of assets, they need to be “moveable” and therefore be shared or traded with other parties.
  • Assessable: For defining something as an asset it needs to be allocated with an objective value.

Curious? Let’s talk!

Define your company’s data asset strategy

Curious about how a data asset strategy can help your company accelerate business? Or what possibilities already exist for capitalizing data as corporate assets? >> Click here to arrange an online meeting with our CEO Thomas Plank and talk about the future of a trusted data economy and how your data can be transformed into reliable corporate assets.<<

Our technology helps you to qualify your data as corporate assets

Our product acts as a software-based notary service for qualifying data as corporate assets – no matter if sensor, process or even usage data from applications. Therefore, the product helps companies to fulfill all of these requirements and form the basis for qualifying their data as corporate assets in the future. >> Click here for more details about our technology .<<


Curious? Talk to us!

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.

Data Exchange Platform vs. Tributech DataSpace Kit

Data Exchange Platform vs. Tributech DataSpace Kit

If you want to start a new digitalization project today involving several companies – but at least two – you are faced with numerous decisions. Progressive innovation has made life easier for us in many areas, but decision-making has become much more difficult – especially when it comes to technologies. The reason is: There are so many different options and sometimes they seem to be pretty similar – at least at a first glance. One of the most fundamental decisions when connecting several companies within a value chain is the one between a central platform or a more modular approach of combining several technologies and suppliers.

The Challenges

Let’s first take a look at the initial situation and the challenges you will face if you want to digitally connect a supply chain:

Dependence on platforms

When connecting several companies in a supply chain, it can be assumed that each participant has reached a different degree of digitalization or a different maturity level. If you choose a Data Exchange Platform, you must first find out the lowest common denominator of all stakeholders and then decide on a system whose minimum requirements are eligible for everyone. This is where your dependency on a platform begins – a topic that will be dealt with more often in this article. You also need to decide which company in the supply chain will manage and therefore control the platform – a role that requires a lot of effort but also brings power. Prepare yourself for difficult negotiations.

Letter of approval for data exchange

The bigger and more important your business partners are compared to your company, the less willing they are to release or disclose data. Especially with sensitive data, this willingness is often practically non-existent. If you opt for a Data Exchange Platform, you face the challenge of finding a system that maintains the basic trust of all participants. After all, in the worst case, the wrong choice can have fatal consequences. With a Data Exchange Platform, you always create a potential single point of failure for yourself – once the platform has come to a standstill, your entire supply chain will. Let’s be honest: Do you really want to put this responsibility on a single external vendor? But the even greater threat lurks in the area of security. With a Data Exchange Platform, all your supply chain data is stored centrally at an external provider. It’s hard to imagine what would happen if a data breach takes place here. And that’s really the biggest downside of Data Exchange Platforms: you don’t have the security of your own sensitive data in your own hands. Do you think you can have peace of mind?

Costs and sustainability

As long as you are committed to end-to-end solutions, you are likely to have to work with multiple platforms for integrating multiple suppliers and customers. In addition, it is highly likely that you will only be able to exchange specific data such as documents via these platforms – only a few platforms allow the exchange of sensor or process data. This means that several solutions must always run in parallel in order to cover the entire data exchange. A future-proof solution looks different – and it is not particularly cost-saving. We at Tributech strategically decided to design our solution with distributed architecture. In the following, we will explain what made us make this decision.

Comparison Data Exchange Platform vs. Data Space Kit

Central storing and routing of data vs. peer-to-peer exchange of data

Data Exchange Platforms are mostly designed with central storing and routing of data. This results in the above mentioned problems regarding the risk of a data breach and has a single point of failure. With our DataSpace Kit, data is transferred peer to peer from company to company and is not stored or routed centrally anywhere. If a participant in the chain fails, there is never a risk that the entire system will come to a standstill. All processes that do not directly affect the participant can still be carried out. In addition, with a data breach, only data from a single participant can be disclosed – so the extent of an external intervention can never be as enormous as with central storage.

One technology vs. best of breed

If you opt for a Data Exchange Platform, you will be dependent on a single provider. Not only do you buy the right to use its platform – you also buy its sense of security, its support and above all its innovative spirit. Usually, this can be a bit frustrating if you have an idea to extend your system. New functions are usually only integrated by the providers when they are requested or even only when requested by several customers. So it can sometimes take a very long time until your innovative ideas are implemented. With a best of breed approach, you combine the best technologies and vendors for a specific task or feature and therefore you are not dependent on a single provider. You don’t have to adapt to one system, but rather integrate individual functions, even from different providers, into your existing landscape. So you can react quickly to new ideas or requirements and always adapt your system to your wishes by switching a specific technology or vendor without “harming” the rest of the system to much. You are not dependent on any decisions that you cannot influence yourself.

Interoperability & data sovereignty

Data Exchange Platforms are usually very limited regarding data formats. A system mostly allows only certain file formats and thus severely restricts your cooperation with your business partners. Additionally, in such a system, there is always a single entity that controls the entire platform. A decentralized DataSpace Kit gives you the full power of decision over your data and allows you to share exactly that data, in the required data formats, that is really needed for the supply chain.

The security issue

With Data Exchange Platforms you always bear the associated risks due to your dependence on one provider – first and foremost a possible data breach and single point of failure. With a decentralized system, such as our DataSpace Kit, these risks do not exist. Data is always only exchanged peer to peer, which is why the functionality and security of a system can never depend on a single entity. As a partner, you always retain data sovereignty and can decide for yourself which data is released at which point in time.

Complexity

Of course the design of a central Data Exchange Platform also has advantages. Single platforms are basically easier and faster to set up as you only have one technology and vendor compared to combining several in a best of breed approach. However, with our DataSpace Kit we can significantly reduce the setup costs and complexity of setting up a decentralized solution by offering an out-of-the-box solution for connecting systems and transferring data between them. Therefore, by combining the advantages of both approaches we can offer our customers high flexibility for their best of breed approach without the trade-off of increasing complexity and costs compared to a central platform approach.

Decentralization – a decision of security & data sovereignty

As already mentioned, based on the above described topics the decision for the modular system design with peer-to-peer approach for the data exchange was very easy for us as Tributech. While we strongly discourage following any hype in decentralization and blockchain, the case for peer-to-peer data exchange, data security, and data sovereignty solutions speak for itself. The most important aspect for us is the significant increase in data security and system stability – because an entire system should never stand or fall with a single party.

Curious? Talk to us!

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.

Is “data as corporate asset” the next big thing?

Is “data as corporate asset” the next big thing?

In a previous post, we talked about the future of data economy and what important role data will play to be a successful player in this future playground. In this blog post, we want to shed some light on the role data can play in fueling future success and how companies can set up strategic processes to rethink the way data is seen in companies.

Today’s Challenge

As more and more companies are transforming to a data-driven business world, the international research firm Gartner predicts that by 2022 companies will be valued mostly on their information portfolios. This development underlines the trend of data moving to the status of a business asset, but where can these be found in the balance sheet of a company? Current GAAP and IFRS accounting standards do not permit data (intangible assets) to be capitalized on the balance sheet, which currently can lead to considerable differences between the book value and market value of a company.

Our Vision

We at Tributech believe that the true value of a company should be reflected in a corporation’s balance sheet and as there is an increase in the relevance of data for business success it has to find its way for being represented in the balance sheets. Additionally, through an activation, it is more likely that it gets the management attention it deserves and needs for being used as true corporate asset fueling the future success of the company. This can help to reduce the huge gap, especially with technology companies, between the current market cap and the book value and also help optimize goodwill in M&A transactions.

Introducing Data Asset Management

When asking CIOs or IT leaders what is the most important asset of their company, they will most likely say, “data”. But is it really managed and treated within the company as an asset? For example, if you take a look at organization’s value chains, financial reportings or asset management divisions for physical assets, are there similar accounting and asset management practices implemented for their “information assets”? Companies, who want to truly change to a more data-driven business, need to see data asset management as a cross-sectional topic starting with strategy development, sales, marketing, IT, governance and accounting. With an active data asset management, the decision-makers of a company can identify
  • relevant data for supporting the execution of the company’s strategy
  • data sources from other companies that can add additional value to the company
  • new business opportunities for the company based on analyzing data or
  • data that can deliver additional value for other companies and therefore can be monetized by selling it

Enabling new business opportunities

Summarized the cross-company view and management of data can enable the following business opportunities:
  • Introduce new data-driven services: Offer new services (e.g. predictive maintenance) by also considering data sovereignty of customers
  • Share & license technology or IP: Transfer knowledge & technology to partners by having auditability of proper use
  • Add revenue streams by monetizing data: Share auditable data with partners or on data markets to create new revenue streams
  • Drive innovation in AI: Setup and participate in data pools without the trade-off of central storing or routing
  • Use auditable data as a basis for agreements: auditable usage data as trusted basis for business & legal agreements
  • Enhance traceability within supply chains: Increase traceability within global supply chains even across processes, systems, and companies

Qualifying as Business Asset

For upgrading data to business assets, it is necessary to define what qualifies data as assets and how it can be uniquely linked to a company and made sure that it is tamper-proof. We propose 3 key requirements for data as a necessary foundation to qualify as a business asset and therefore can be capitalized on companies balance sheets:
  • Auditable origin: Data collected by IT systems need to be auditable to verify its origin and uniqueness.
  • End-to-end integrity check: Need for data integrity checks across systems starting at the data source to monitor for unauthorized changes.
  • Data ownership: Data from 3rd parties needs to be synchronized, based on a sharing agreement to document ownership and permission to use.

Enabling Technology by Tributech

Tributech offers the technology for your company to secure and share data cross-company or cross-process in a selective, tamperproof way while maintaining data sovereignty. This data could be IoT, process or business data as well as documents. Businesses can therefore rely on the data source and its integrity – especially when the data is transferred cross-company. Tributech’s technology adds the following features to the IT infrastructure of companies:
  • Peer-to-peer data sharing functionalities between companies – without central storing or routing for high data security and privacy
  • Event-based and contract-based data access management that ensures data sovereignty and traceability of exchanged data for all involved parties
  • Cryptographic proofs of data, created at the data source, are securely and tamper-proof stored in a distributed ledger for guaranteeing cross-system and cross-company auditability of data origin and integrity
  Together with our partners we aim to drive the discussion about this topic and help to transform data into valuable business asset. If you are interested in joining our vision and discuss the role of trustable data in a data-driven future then feel free to contact us!  

Curious? Talk to us!

Tampered IoT Data – The “fake news” of the Industrial IoT

The rising amount of collected IoT data, the trend towards data-based decision-making and new data services increase the risk of being vulnerable to manipulation. Therefore, companies should implement countermeasures to prevent IoT data form being tampered and build their data services and IoT platform on a trustable foundation.

Covid-19: Behind the mask

Nothing new came forth but it would have enhanced prior knowledge if considered before.
A few weeks after the outbreak of the covid-19 pandemic, it makes sense to draw a first conclusion of what we’ve seen and heard from industry players and we tried to summarize some of our core findings.

Alexander Sztatecsny – new COO of Tributech

Alexander Sztatecsny, who has been working in different areas of Digitalization across the value chain for most of his business life, has recently joined the team of Tributech as COO and Managing Partner and will work with the team to elevate the business to the next level.