Data retrieval door
Today’s applications store their data in a nameless way. To use the data, programmers must write application software that identifies it. Hackers use this door to inject their code to launch malicious actions. In contrast, ROBUST's software engine automatically identifies each piece of data in advance. It, thereby, eliminates the need to write application code in order to use the data. In fact, the ROBUST engine removes the means to do so at all. Better than closing retrieval doors, it simply eliminates them altogether.
Black Box Door
Today, an application operates as a ‘black box’. It does not provide security software with any visibility into what it is doing. Security software can merely ‘second guess’ from the outside whether the application’s actions are legitimate or not. The level of protection this process can provide is, by definition, quite limited. Given the abundance of evidence of expanding cyber-attacks on our voting systems, this limitation poses an unacceptable risk. In contrast, the ROBUST software provides a built-in ‘monitor’ inside the application. It always knows who is allowed to do what. It tracks all activities. When it detects an inappropriate application request, it isolates it and neutralizes it so that it cannot propagate. No doors.