Prove the device.
Trust the data.

The First Trust Layer for Devices

Core and Dot anchor identity in hardware continuously verifying presence, isolating unknowns, and alerting the instant trust is broken.

01

Core — The Network
Trust Engine

Core — The Network Trust Engine

The brain of your trust layer.

A compact local hub that becomes the authority for every connection.

A compact local hub that becomes the authority for every connection.

With real-time logic, AI-driven anomaly detection, and a built-in Trust-MS encryption chip, Core learns, alerts, and isolates threats even offline.

It sets the baseline of truth for your entire network.

With real-time logic, AI-driven anomaly detection, and a built-in Trust-MS encryption chip, Core learns, alerts, and isolates threats even offline.

It sets the baseline of truth for your entire network.

It continuously fingerprints and verifies every device generating cryptographic Device DNA to answer two questions that define digital trust:

  • Whats connected?

  • Can it be trusted?

It continuously fingerprints and verifies every device generating cryptographic Device DNA to answer two questions that define digital trust:

  • Whats connected?

  • Can it be trusted?

02

Dot — The Last
-Mile Device Guardian

Core — The Network Trust Engine

Dot protects what matters most.

Installed inline between your switch and any critical device, Dot verifies physical presence continuously.

While Core sees the entire network, Dot focuses like a microscope enforcing trust at the cable itself.

If a device is tampered with, swapped, or disconnected, Dot cuts access instantly blocking impersonation and triggering immediate alerts.

From Setup to Protection
in Minutes

From Setup to Protection in Minutes

The First Trust Layer for Devices

Instant visibility.
Verifiable trust.
Autonomous enforcement.

No complex installs.
No software agents.
No delays.

01

Plug in Core

Connect Core to your network. Within seconds, it maps every device — visible or hidden — without agents or configuration.

01

Plug in Core

Connect Core to your network. Within seconds, it maps every device — visible or hidden — without agents or configuration.

01

Plug in Core

Connect Core to your network. Within seconds, it maps every device — visible or hidden — without agents or configuration.

02

Build Device DNA

Core fingerprints each device with a cryptographic identity, locking trust in hardware so spoofing and silent swaps fail.

02

Build Device DNA

Core fingerprints each device with a cryptographic identity, locking trust in hardware so spoofing and silent swaps fail.

02

Build Device DNA

Core fingerprints each device with a cryptographic identity, locking trust in hardware so spoofing and silent swaps fail.

03

Deploy Dots

Place Dots inline with your most critical devices — from servers to sensors — for tamper-proof, cable-level enforcement.

03

Deploy Dots

Place Dots inline with your most critical devices — from servers to sensors — for tamper-proof, cable-level enforcement.

03

Deploy Dots

Place Dots inline with your most critical devices — from servers to sensors — for tamper-proof, cable-level enforcement.

04

Protect in Real Time

Core and Dot work together to detect threats, verify presence, and cut access the instant trust breaks — even offline.

04

Protect in Real Time

Core and Dot work together to detect threats, verify presence, and cut access the instant trust breaks — even offline.

04

Protect in Real Time

Core and Dot work together to detect threats, verify presence, and cut access the instant trust breaks — even offline.

Software assumes.
Hardware proves.

The First Trust Layer for Devices

When trust matters, proof beats assumption and enforcement beats observation.

Software-Only Security

KYD Hardware-Anchored Trust

Proof of Presence

Assumes device is valid if it’s online

Verifies physical presence continuously

Proof of Presence

Assumes device is valid if it’s online

Verifies physical presence continuously

Proof of Presence

Assumes device is valid if it’s online

Verifies physical presence continuously

Identity Binding

Relies on mutable MAC/IP data

Locks identity in hardware

Identity Binding

Relies on mutable MAC/IP data

Locks identity in hardware

Identity Binding

Relies on mutable MAC/IP data

Locks identity in hardware

Control

Observes traffic only

Enforces at cable level

Control

Observes traffic only

Enforces at cable level

Control

Observes traffic only

Enforces at cable level

Response Speed

Cloud-dependent and delayed

Sub-second, local enforcement

Response Speed

Cloud-dependent and delayed

Sub-second, local enforcement

Response Speed

Cloud-dependent and delayed

Sub-second, local enforcement

Audit

Logs can be altered

Immutable, tamper-evident history

Audit

Logs can be altered

Immutable, tamper-evident history

Audit

Logs can be altered

Immutable, tamper-evident history

Offline Protection

Stops when cloud is unreachable

Operates offline; enforcement never stops

Offline Protection

Stops when cloud is unreachable

Operates offline; enforcement never stops

Offline Protection

Stops when cloud is unreachable

Operates offline; enforcement never stops

Command — Your Network. In Your Pocket.

Your single pane of glass for device trust — live visibility, instant alerts, and one-tap enforcement from anywhere.

See everything — every device, every status, every alert.

React instantly — receive push notifications for tampering, theft, or spoofing.

Control with a tap - approve, isolate, or cut access instantly.

Stay protected — Core enforces locally, even offline.

Frequently
Asked Questions

Technical Specifications

Full technical specifications for Core, Dot, Dash, and Command will be published at launch.

In the meantime, detailed datasheets are available on request.

What happens if a device is stolen?

What happens if a device is stolen?

What happens if a device is stolen?

What if someone tries to spoof a device?

What if someone tries to spoof a device?

What if someone tries to spoof a device?

Does KYD still work if the internet is down?

Does KYD still work if the internet is down?

Does KYD still work if the internet is down?

Do I need to install software on my devices?

Do I need to install software on my devices?

Do I need to install software on my devices?

What’s the difference between Core and Dot?

What’s the difference between Core and Dot?

What’s the difference between Core and Dot?

How fast does KYD respond to threats?

How fast does KYD respond to threats?

How fast does KYD respond to threats?