Revolutionary Blockchain technology that sets us apart.
A modern solution
Traditional cybersecurity assumes that perfection is possible and that patches, firewalls, and antivirus solutions are sufficient to protect against increasingly complex attacks. The reality is very different: traditional cyber-defenses are powerless against modern zero-day and supply-chain cyberattacks.
CastIron leverages moving target defense technology with Polymorphing and Polyscripting technologies that provide protection against zero-day attacks, unpatched systems, and even complex supply-chain attacks with no impact on system performance or operational procedures. It literally stops attacks before they start by scrambling our binary code making it impossible for a hacker to identify the most known vulnerabilities.
CastIron leverages the power of the Google Cloud Platform (GCP). Combined with the architecture of CastIron, we provide unparalleled system security in the elections market. By running on the Google Cloud Platform, CastIron takes advantage of the same secure-by-design infrastructure, built-in protection, and global network that Google uses to protect your information, identities, applications, and devices. Their cloud infrastructure builds security through progressive layers that deliver true defense in depth.
Communications over the internet are encrypted in transit and we use cutting-edge technology and multiple layers of protection to defend against denial-of-service attacks. Access to sensitive data is protected by advanced tools like phishing-resistant security keys and data is automatically encrypted at rest and distributed for availability and reliability. We have architected our elections management platform to be immune to external and internal threats and, most importantly, end-to-end verifiable by the academics, technologists, political parties, and advocacy groups that may question the integrity of an online voting system.
Our standard blockchain-based platform (CastIron®) provides the following unique characteristics:
- distributed database (fault-tolerant)
- immutability (cannot change the past)
- integrity (cannot hack the present)
- data transparency (every node with access can see the results)
- permission-based (only those authenticated parties have access)
- audit trail (every vote can be irrefutably traced to its source)
- anonymity (ballots cannot be traced back to the voter)
Votem has processed over 13 million voters for both public (government) and associations across the US and world without fraud, compromise, attacks nor hacking of any kind.
In addition to our technical infrastructure, Votem is a founding member of the U.S. Elections Infrastructure Sector Coordinating Council (EISCC), and an active participant in several cybersecurity working groups, Votem is committed to the highest levels of security. Our work with the U.S. Department of Homeland Security (DHS) and the FBI means we have insider knowledge to guard your elections against the latest threats to the election ecosystem. Our CastIron online voting platform has been reviewed, vetted, and approved by the U.S. Department of Homeland Security’s cybersecurity division, CISA, and several U.S. states’ IT divisions with zero server-side and application high or medium vulnerabilities.