UNCLOAK – The Future of Cyber Threat Detection
The buzz about cryptocurrency is increasing, people have heard about it, and more and more people want to find more about it, and find a way to be a part of it. When blockchain technology came, so many things changed, for better, we say. So many businesses have improved, so many companies have started using crypto currencies in their work. The new ideas are coming every day. People want to invest in the new projects. We have the biggest tool in the world, and it is called the Internet. The internet is a enormous base of information where we can do anything. Internet has connected the entire world. One of these projects is Uncloak, a fully scalable blockchain powered technology that enables businesses to monitor, protect themselves against and eliminate cyber threats, staying one step ahead of the Hacker.
Check Out this Video presentation
Uncloak is a fully scalable blockchain powered technology that enables businesses to monitor, protect themselves against and eliminate cyber threats, staying one step ahead of the Hacker.
Uncloak is an Artificial Intelligence (AI) based analytical tool for the intuitive, automated and seamless performance of security checks: giving users the ability to cut through the cyber jargon and understand, remediate and resolve cyber security issues. In the absence of innovative tools such as Uncloak, successfully evaluating a company’s computers and network infrastructure requires specialised, highly skilled labour, extensive setup time and significant costs.
Cyber crime damage costs to hit $6 trillion annually by 2021. Cybersecurity spending to exceed $1 trillion from 2017 to 2021.
- Businesses have IT security gaps
- Majority of security tools are unable to react to changes in hacking methodology and types of cyber attacks
- Hackers are learning and sharing how to stay ahead to exploit these security gaps
- Security breaches result in financial and reputational damage and the closure of Companies
- Shortage of qualified IT security consultants
- IT security consultancy is only valid during the time of consultation
- *Businesses need to be aware of the full costs of a cyber-attack, in particular, the “slow-burn” costs (i.e. those associated with the long-term impacts of a cyber-attack, such as the loss of competitive advantage and customer churn). When added to immediate costs (i.e. legal and forensic investigation fees, and extortion pay outs), slow burn costs can dramatically increase the final bill.
SOLUTIONS & FEATURES
Uncloak will be the world’s first blockchain 3.0 powered cyber threat detection solution for multi region resiliency and geographically dispersed computing. The current version includes a vulnerability scanner which automatically discovers a clients public computing infrastructure for a security scan. This greatly reduces the timescale around security scanning. The revolutionary Black Hat mode is able to simulate a live hack attempt against an email server, and check a clients antivirus protection.Future builds will include AI technology which scans hundreds of millions of records on the internet and the hidden web. Uncloak is taking a proactive approach to existing and new vulnerabilities. Zero hour threat detection will provide a constant real-time cyber threat inventory.
Next generation cyber security vulnerability scanning system to ensure business remain compliant and aware of security issues. In addition, Uncloak’s database provides a constant real-time cyber threat inventory. Businesses can stay ahead of and eliminate cyber threats themselves, rather than relying on expensive 3rd party services such as those provided by the big four consultancy practices. Key cyber threat vulnerability scanning tools (in development) include:
• On premise software tool: Allow users to scan their internal network for threats and vulnerabilities and report back to the central dashboard.
• Advanced network discovery tool: Cloud environments can be scanned with ability to look for vulnerabilities across public/private/hybrid cloud environments ranging from Microsoft™, AWS™ and Google™.
• Intelligent Security Compliance tool: Innovative engine to check against cyber essentials/PCI DSS/ISO27001 compliance requirements.
• Black hat extreme mode: Conversion of online security database into a number of additional tools that can check for vulnerabilities with multiple operating systems issues ranging from the website, workstation and databases.
Advanced artificial intelligence to check public & hidden internet data for “Zero Hour” cyber threats. The AI technology will allow threats to be exposed and validated. AI will handle the scans millions of records on the public internet and the hidden internet, searching for new and existing vulnerabilities and potential new vulnerabilities or identify the latest cyber threats.
Blockchain powered cyber threat detection solution using ‘bug bounty’, allowing verified IT security experts worldwide to collaborate in resolving cyber threat vulnerabilities and be rewarded through a fully automated system. Through the bug bounty program, security testers are rewarded for identifying new threats, including:
• Vulnerabilities are not allowed to be added to the platform without approval from a pool of verified hunters chosen at random
• End to end visibility of vulnerabilities found and payments to hunters within the Uncloak platform occur automatically without intervention
• Real-time analytics and automated reporting with a locked audit trail of everything
• Tamper-proof vulnerability database
• Securely sharing data with all parties
• Reduce reporting process time and effort for vulnerability checks
• Leader-board system for all registered hunters/validators with bonus stars given to the most frequent contributors resulting higher in token payouts.
Benefits of Using Uncloak
Uncloak affords everyone the opportunity to be proactively secure from cyber threats at a fraction of the cost.
Currently, Uncloak code is not open to the public, that will change in a week or two. You can join the official telegram here https://t.me/uncloakio to stay abreast of all the developments of Uncloak.
TOKEN SALE AND ICO
Uncloak will issue 2 types of tokens
UNC (ERC 20)
Firstly, the UNC token will be released on the ERC-20 format. UNC serves the purpose of being easily externally tradeable.
Secondly, the UCC token will allow:
Companies will need UCC to access the platform and reward the bug hunters.
Bug hunters will be paid in UCC.
Total Token Supply: 4,200,000,000 UNC
Unsold tokens will be burned
Hard Cap: $21,000,000 USD
Soft Cap: $6,000,000 USD
Presale ICO Start: 25 May 2018 8:00 AM GMT
Presale ICO End: 25 June 2018 2:00 PM GMT (or as long as supply lasts)
Main ICO Start: 26 June 2018 8:00 AM GMT
Main ICO End: 3 July 2018 2:00 PM GMT
$200k USD min private sale
40% would be immediately released after end of public sale (ICO). These however will be locked as the project does not see themselves as a pump and dump opportunity. Thus, the Tokens will be locked until an exchange to prevent DEX trading. Uncloak anticipate an exchange listing around June/July and have started dialogue with the bigger exchanges.
40% released before exchange listsing
20% released 3 months after exchange listing
Maximum Presale ICO Investment Cap: $100,000 USD
ETH $5000-$25000 20% discount 1 UNC = $0.008
ETH $25000-$49999 25% discount 1 UNC = $0.0075
ETH > $50000 30% discount 1 UNC = $0.007
Token Bonus from 10% to 30% dependent on Token contribution.
$1M-2M 30% BONUS
Token Price: 1 UNC = $0.01 USD
Minimum ICO Investment: 10,000 UNC tokens equivalent to $100
Maximum ICO Investment: $100,000 USD
Main ICO Bonus 10%
Unlocked on Exchange Listing
50% Token Sale: UNC token will be offered for sale to be used for the Uncloak platform.
15% Early Backers, Equity Investors & Advisors: Uncloak have early investors and advisors to help with the development of the technology. Part of the equity investments have been converted into tokens.
15% Founding Team (18 months vesting)
10% Retained by Uncloak for Bug Bounty program (clarify bug bounty program in place): The retained tokens will be used for converting between UNC and UCC tokens for hunters and can also be used in additional offerings to further development and staff incentives.
10% Developer Fund: Used to incentivise, reward and attract outside developers to build projects, integrations, partnerships, hackathons and community involvement. Growing the ecosystem is important.
Use of funds
55% R&D: Use to continuously develop the product, grow the team globally.
20% Sales & Marketing: Grass-roots marketing to start and expand to webinars, conferences,
sponsorships, advertising and PR.
10% Community costs: Initial capital needed to incentivise the community and drive membership for bug bounty.
10% Operations: General overhead and administrative costs for running the business on a global scale.
5% Legal, Compliance & Accounting.
Meet The Amazing Team
Tayo Dada (CEO)
Based in London’s Tech city, Tayo has Over 30 years of experience working in IT from software development to IT management. Tayo manages an award-winning InfoSec team of experts in IT security and Cyber Threat management who are furnished with industry recognised qualifications/certifications including SC clearance, CISSP, ISO27001, Cyber Essentials, CEH and CREST. Actively involved in working with Start-ups and organisations who aim to accelerate their growth through innovative IT Solutions. Industry expert on IT Security with a background in hacking. Help set up Big 4 consultancy’s first ethical hacking division in the UK.
Phil Jackson (CTO)
Nicholas Topham (COO)
Nicholas has worked at the forefront of the TMT sector for 30 years, operating as a CEO, COO, partner level consultant and Investor. His experience spans the decades from computerisation, through liberalisation, mobile, the Internet, Datacentres, the growth of Asia and Developing markets, the Cloud and Applications and the processes necessary to run a business.
Nick Banks ( Commercial Director)
A senior commercial advisor to innovative technology companies for over thirty years. Building businesses that are sustainable and profitable has been a passion and achievement throughout a long and rewarding career. Successfully taken a number of different innovative technology companies to market globally and driven them to profitability and successful IPO or private sale. Achievements have included starting WatchGuard in Europe prior to a successful IPO, Managing Director of Webroot as it transitioned from a consumer to enterprise focused company, Global VP Sales of IronKey, a brand eventually sold to Kingston Technologies and VP Sales of emerging markets for CyberGuard.
Toby Abel (AI Expert)
Toby is a technology entrepreneur creating product development teams, overseeing tech builds and crafting funding and BI strategies for startups, MVPs, business transformation and exits. Combining AI- driven search and recommendation engines with industry relevant tools and deep linguistic analysis. Working across business sectors including: events, technology, education, recruitment, security, fashion and news. Toby uses outstanding consultancy skills to take world class teams with proven prototypes to a global stage.
Brendan Sturm (Blockchain Developer)
Brendan is an engineer, entrepreneur, and blockchain enthusiast. Brendan’s background is in computer science with experience in Solidity, token development, Dapp development, and Python. Previously, he worked at Capital One where he designed and implemented many fraud defenses.
Be a part of this incredible project. Download the whitepaper for the full scoop.
Till next time…
For more information, please visit:
My BitcoinTalk Profile: https://bitcointalk.org/index.php?action=profile;u=1326035
Disclaimer: This article was published in terms of the bounty campaign. I am not a project team member or its representative but a supporter of this incredible project.