
Suvola Corporation
Information technology cyber security company pioneering the next-generation security solutions.
Date | Investors | Amount | Round |
---|---|---|---|
- | investor | €0.0 | round |
$950k | Seed | ||
Total Funding | 000k |
Related Content
Suvola Corporation operates in the cybersecurity sector, focusing on critical vulnerabilities in identity management, system tampering, and authentication. Founded in 2013 by Christopher Piedmonte, John Ellis, Marc Marshall, and David Stein, the company is based in Cedar Park, United States. Co-founder Christopher Piedmonte has a three-decade background in creating solutions for complex IT systems, including founding and leading previous tech ventures like XSPRADA Corporation and Eagle Creek Systems, Inc. Suvola has secured seed funding from investors including MACH37 and the Centre for Innovation & Technology.
The company's business model centers on providing hardware and software solutions to enterprise clients, particularly those requiring high security for on-premise or cloud deployments. Suvola develops and sells rack-mountable, turnkey appliances that combine its proprietary software with secure hardware, targeting the enterprise information technology appliance market. This approach is designed to offer cost-effective and easily manageable infrastructure for tablets, mobile applications, and the Internet of Things (IoT).
Suvola offers a dual-pronged product strategy. The first is an ambient identity device, a piece of hardware that can be embedded into wearables and equipment. This device uses BLE (Bluetooth Low Energy) for communication to provide password-less identity verification, aiming to enhance security and user convenience. The second core product is a tamper-proof computing platform. This platform integrates the company's enterprise software with secure high-density, low-power (HDLP) computing hardware. It provides hardware-level cryptography, trusted software execution, and secure key storage to create an environment resistant to unauthorized modifications. By deploying applications on these secure appliances, clients can protect against tampering-based cyberattacks.
Keywords: cybersecurity, tamper-proof computing, identity management, authentication hardware, secure computing platform, enterprise security, cloud infrastructure security, IoT security, hardware cryptography, secure appliances, data vault, Christopher Piedmonte, MACH37, access control, secure key storage, network management software, system-on-a-chip security, passwordless authentication, enterprise data management, cybercrime prevention