Mission
Revolutionary SaaS Platform for Next Generation Enterprise Digitalization and Enablement of Dark Data for Massive AI/ML
SaaS platform to implement zero trust models
Help implement zero trust models across market segments for interoperability, security, scalability, and availability with an on-cloud or on-premises SaaS platform for edge gateways and heterogenous brownfield/greenfield devices.
Trusted data from authenticated devices to AI/ML
Enable AI/ML for millions of IoT and IIoT devices and massive data streams requires lifecycle orchestration with simplification from the application developers to original equipment manufacturers, end-users, and field operators.
Operational efficiencies for IT/OT convergence
Lower the cost of modernization and digital transformation significantly and increase operational efficiencies from factory to field with visibility, and control for IT/OT convergence at scale.
Agent-less with simple APIs for low coding in any programming language
Provide an agent-less, OS/processor agnostic, low-coding approach, with simple APIs in any programming language, for two-factor device authentication, identifiers-based authorization, quantum-proof field communications, messaging integrity, secure content distribution with supply chain provenance, data signing and AI risk classification labels, and remote remediation for timely risk mitigation.
Vision
Our vision is based on boiling things down to first principles and building up with single defining ideas to foster digital transformation with simple innovations.
Massive simplification of APIs for application developers. Less is more. APIs that fire are APIs that wire.
Accelerated workflows, with low or zero touch, from factory technicians to field operators to effect operational efficiencies and cost reduction in existing infrastructures and brownfield/greenfield devices.
Synergy between application developers, device manufacturers, and end-user operators for highly available, scalable, and secure solutions for cyber safe devices and trusted data to AI/ML
Why
- Trust in data is paramount and the cornerstone for AI/ML enablement and collaboration
- Trust in cyber safe devices is required on the first mile
- Trust in cyber trusted data is required on the last mile
What
- Lowers TCO for End Users.
- Reduces costs of development and maintenance for OEMs
- Monetizable data to collaboration services
- 10x simplification for application and device lifecycle management – Massive IoT
How
- Symmera is the orchestration bridge to AI/ML using cyber safe devices and cyber trusted data
- Symmera provides an agentless SaaS platform for vendors to put a cyber trust label on a device, ship it, and onboard it with zero-touch in the field
- Symmera’s technology is applicable to all market segments, from industrial control systems to retail, energy, defense, healthcare, transportation, logistics, hospitality, and finance
Value Proposition
Scalability
- SaaS platform (on-cloud or on-premises)
- Agent-less with just 3-5 APIs for low-coding in any programming language for capability integration within days
- Zero-coding with command line utilities
- Speed to market with quick application integration within weeks
- Automation from manufacturing to onboarding, provisioning, secure content distribution for updates, visibility, and data harvesting for AI, ML, SIEM and SCADA services
- Any Device Type: Sensors, Actuators, Controllers, Gateways, Autonomous Systems, Integrated Systems
Availability
- No service disruptions in live production environments with automated device, key, and certificate lifecycle management
- Ubiquitous support for Internet connected (IoT), mobile (roaming), controlled (restricted), or air-gapped devices
Security
- Standards compliance (CRA, NIST 800, IEC 62443, Industry 4.0, HIPAA, NERC-CIP, PCI-DSS, FCG, IEEE 802.1AR)
- Platform agnostic, works with any chipset, operating system, security protocol stack, or cryptography library
- Zero PKI or Lightweight PKI (Simplified) operating models
- Quantum resistant ciphers for long-lived devices
Interoperability
- Open standards based secure field communications between multi-vendor and heterogeneous devices at and beyond the edge
- RESTful interface for integration and information exchange with third-party asset and device management systems
Trackability
- Automated zero-touch device discovery (label scan) and license management (node-locked or floating)
- Remote asset management with security audits, device health monitoring, and trusted updates
Metadata
- One API to export device and application intelligence (e.g., telematics, logs, device health, device attributes) in any programming language to cloud or edge based micro-services and AI/ML engines
Executive Leadership
Srinivas Kumar
Srinivas Kumar
Srinivas Kumar is a serial entrepreneur and technocrat with over 35 years of hands-on engineering and management experience in computer networking and security. Prior to joining DigiCert as the VP of IoT Solutions, he was the CTO and CPO at Mocana (acquired by DigiCert in 2022). Prior to joining Mocana in 2016, he was the CTO of TaaSera. He founded TaaSware in 2011 (acquired by TaaSera in 2012). During his time at TaaSware he served as an entrepreneur-in-residence at SRI International. Prior to that, he was a solutions architect in the networking and security business unit at VMware. He was previously the VP of engineering and solutions architect for identity-based access controls at Applied Identity (acquired by Citrix in 2010). He has served in senior project and architect roles at Nortel, Lucent and TranSwitch. Earlier in his career, as engineering manager at Firearms Training Systems (acquired by Meggitt Training Systems), he led the design and development of real time marksmanship and squad engagement simulators for training law enforcement personnel and the military. He holds 42 U.S. patents in the field of cyber-protection for IoT, cybersecurity, user and application identity-based access controls, network and endpoint security, and evidence based predictive analytics. He has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards. He holds a BE degree in electrical engineering from VJTI, Bombay University, and an MS degree in electrical and computer engineering from Clemson University.
View on LinkedIn
William Diotte
William Diotte
William Diotte is a serial technology entrepreneur, executive, and investor in emerging technologies with a strong track record of results and successful exits. Focused on the intersection of Blockchain, Cyber, AI, 5G – Bill brings real world experience of how/why disruptive companies succeed or fail – and how to find the right balance for entrepreneurs and investors to enable long term success. As an Advisor or Independent Board Member, he adds value by working with management teams to create results for their companies – focusing on GTM Strategy, Technology-to-Productization evolution, and Strategic Customer & Partner Acquisition. A high energy entrepreneur and executive with 20+ years of experience in the tech world, and more than a few battle scars, he is very passionate about working with promising emerging companies focused on disrupting industries with a strong sense of Mission to better the world we live in.
View on LinkedIn
Scott Heinemann
Scott Heinemann
Scott has 25 years of venture capital, finance and operations experience with high-growth companies in multiple industries. His last two exits as CFO were with a workforce management software/consulting firm and, most recently, a SaaS Video-on-Demand provider focused on the health and fitness industry. Both of these companies grew rapidly, raised outside capital and had successful exits with private equity and strategic buyers.
Scott is enthusiastic about working with executive and leadership teams to overcome the unique challenges that face companies in different industries. He is an operations focused CFO that loves the data-driven decision making process which can lead directly to company success.
Scott earned his Bachelor’s degree in Financial Management from Clemson University and his MBA in Entrepreneurship/Technology and Innovation Management from the University of Colorado, Boulder. He is an avid traveler that enjoys hiking, snowboarding, mountain biking and spending time with his family.
View on LinkedIn
Shreya Uchil
Shreya Uchil
Shreya Uchil has over 15 years of work experience in engineering, product management, and customer success roles in the field of networking and cybersecurity, most recently serving as the Sr. Director of Product Management at DigiCert Inc. Prior to that, Shreya was VP of Product Management and Customer Success at Mocana Corporation. She is passionate about helping customers achieve their business objectives and fostering product growth and adoption. She started her career designing and developing embedded software for satellite systems at Hughes Network Systems and transitioned to solutions consulting and pre-sales roles in the networking industry. She has 5 patents in the field of endpoint security. Shreya holds a BE degree from NIT Suratkal, India, and an MS degree in Electrical Engineering from Penn State University.
View on LinkedIn
Shashank Pandhare
Shashank Pandhare
Shashank Pandhare has over 35 years of work experience as a technical architect and engineering manager in the design and development of real-time embedded systems, networking security protocols, and scalable cybersecurity platforms. Prior to joining DigiCert, Inc. as a Sr Development Manager, he was a principal engineer at Mocana Corporation developing a device protection platform for OT/IIoT/IoT devices. Prior to that he served as the technical director at TaaSera, Inc. in developing an innovative preemptive breach detection system based on a patented dialog correlation technology. He was previously a principal engineer at QLogic Corporation developing network drives for high scalability of 10Gbps adapters for time sensitive networks and secure data transport. He is an energetic and self-motivated person with excellent team mentoring and communication skills, ability to scope project requirements starting from the hardware platform to OS/kernel components, APIs, embedded agents, and hosted services in cloud and Enterprise ecosystems. He holds 8 patents in the field of networking hardware, network, and endpoint security. He holds a BE degree in electrical & electronics engineering from Bombay University, and an MS degree in electrical and computer engineering from Clemson University.
View on LinkedIn
Board of Directors
Kishen Mangat
Kishen Mangat
From 2013 to 2022, Kishen was VP/GM at Cisco Systems, where he was responsible for the Mobility, Automation, Internet-of-Things and Open Radio Access Network (ORAN) business units. He led multiple technology and business model transitions at scale and was responsible for developing and deploying the world’s first nationwide production 5G core network.
Prior to Cisco, Kishen was Founder of BroadHop, Inc. where he and his co-founders were responsible for pioneering dynamic service control in mobile networks and introduced the industry’s first virtualized real time policy controller. Kishen was responsible for building out BroadHop’s global go-to-market and field sales and support operations, while directly engaging with dozens of tier-1 mobile operators. In 2013, BroadHop was acquired by Cisco Systems.
Prior to BroadHop, Kishen founded and was CEO of Amigo Systems (sold to POST). He was also co-founder of STS Hotel Net (sold to CAIS Internet, a KKR Company).
Kishen received his B.A. in Economics from Colorado College, where he previously served as a Trustee. Kishen is currently a member of the Board of Directors of the Access Fund, the national organization responsible for ensuring sustainable access and conservation of climbing resources.
Kishen is an active climber and alpinist, having logged notable ascents across the globe over the past 30 years.
View on LinkedIn
Srinivas Kumar
Srinivas Kumar
Srinivas Kumar is a serial entrepreneur and technocrat with over 35 years of hands-on engineering and management experience in computer networking and security. Prior to joining DigiCert as the VP of IoT Solutions, he was the CTO and CPO at Mocana (acquired by DigiCert in 2022). Prior to joining Mocana in 2016, he was the CTO of TaaSera. He founded TaaSware in 2011 (acquired by TaaSera in 2012). During his time at TaaSware he served as an entrepreneur-in-residence at SRI International. Prior to that, he was a solutions architect in the networking and security business unit at VMware. He was previously the VP of engineering and solutions architect for identity-based access controls at Applied Identity (acquired by Citrix in 2010). He has served in senior project and architect roles at Nortel, Lucent and TranSwitch. Earlier in his career, as engineering manager at Firearms Training Systems (acquired by Meggitt Training Systems), he led the design and development of real time marksmanship and squad engagement simulators for training law enforcement personnel and the military. He holds 42 U.S. patents in the field of cyber-protection for IoT, cybersecurity, user and application identity-based access controls, network and endpoint security, and evidence based predictive analytics. He has led engineering efforts to certify products for common criteria, FIPS, DO-178, US DoD and NATO standards. He holds a BE degree in electrical engineering from VJTI, Bombay University, and an MS degree in electrical and computer engineering from Clemson University.
View on LinkedIn
William Diotte
William Diotte
William Diotte is a serial technology entrepreneur, executive, and investor in emerging technologies with a strong track record of results and successful exits. Focused on the intersection of Blockchain, Cyber, AI, 5G – Bill brings real world experience of how/why disruptive companies succeed or fail – and how to find the right balance for entrepreneurs and investors to enable long term success. As an Advisor or Independent Board Member, he adds value by working with management teams to create results for their companies – focusing on GTM Strategy, Technology-to-Productization evolution, and Strategic Customer & Partner Acquisition. A high energy entrepreneur and executive with 20+ years of experience in the tech world, and more than a few battle scars, he is very passionate about working with promising emerging companies focused on disrupting industries with a strong sense of Mission to better the world we live in.
View on LinkedIn
Partners
Symmera’s simplified APIs for application developers to integrate with our distributed intelligent network orchestration platform for massive AI/ML enablement, and our on-cloud or on-premises SaaS platform for flexible deployment, unified IT/OT workflows, and operational efficiencies has attracted leading device manufacturers, system integrators, managed security service providers, and AppDev professionals to the solution.
Patents
US 63/454,612
Two-factor device authentication and secure communications with authenticated and encrypted data using any crypto engine and over any transport/network protocol.
US 11,968,302 B1 (Granted)
- Two factor device authentication using DNS as the authenticator for permissioned key distribution to authenticated and validated IP addressable devices and applications;
- Digital signing of access tokens for cloud services;
- Authenticated and encrypted communications over IP networks and transport protocols (e.g., UDP, TCP, TLS, IKE);
- Authenticated communications over non-IP networks (e.g., CAN Bus, Modbus, HART, Foundation Fieldbus, RS-232).
US 18/139,480
- Two factor device authentication using a mobile service provider (MSP) as the authenticator for permissioned key distribution to authenticated and validated mobile devices and applications;
- Digital signing of access tokens for cloud services;
- Authenticated and encrypted communications over IP networks and transport protocols (e.g., UDP, TCP, TLS, Mobile IKE).
US 18/139,486
- Applications in industrial control systems that must comply with the Generic Object-Oriented Substation Event (GOOSE) and IEC-61850 (International Electrotechnical Commission) and NERC-CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) standards;
- Applications in transportation systems (e.g., smart vehicles), aviation systems (e.g., commercial and military aircrafts, unmanned aerial vehicles or drones), space systems (e.g., satellites and spacecrafts), healthcare systems (e.g., medical equipment, bedside equipment, surgical equipment, nurse station equipment, on-patient devices, and palliative or hospice care equipment).
- In integrated systems, inter-system messaging between the components (e.g., electronic control units, telemetric control units, on-board diagnostics units, navigation systems, display units, multi-service IoT edge gateways, sensors, actuators, controllers) must adhere to low latency requirements, security, and safety standards.
US 18/139,494
Digital encryption of embedded objects within documents (e.g., PDF, Word, PowerPoint, Excel) between producers and consumers using pre-shared keys.
US 18/139,498
Digital signing and verification of content (e.g., configuration files, application binaries, update packages) between producers and consumers for tamper resistance.
US 18/139,500
Digital signing and verification of content (e.g., configuration files, application binaries, update packages) using pre-shared keys between producers, brokers, and consumers of content for tamper resistance and supply chain provenance.
US 18/139,508
Secure and automatic switchover of a device from an insecure wireless network configured at the factory by the device vendor to a secure wireless network during onboarding in the production network using DHCP-assigned options for the vendor class.
US 11,882,117 B1 (Granted)
- Scalability of secure device configuration with simplified workflows for device manufacturers and field operators;
- Eliminate human errors in device provisioning and onboarding using trusted device identifiers.
US 11,936,772 B1 (Granted)
Quantum-safe symmetric key based digital signing with multi-party and multi-person digital signing with multi-part deep content inspection. Split mode with separate secure channels for content distribution and digital signing keys.
US 12,015,721 B1 (Granted)
Dynamic retrieval of certificates and private keys at runtime by applications executing on devices, without requiring use of certificate management protocols (e.g., SCEP, EST, CMP, ACME, OCSP), high scalability for certificate distribution by certificate authorities, and simplification of the manufacturing workflow for original equipment manufacturers.
US 12,132,846 B2 (Granted)
Authorization of self-signed and CA issued certificates with host address and network subnet address validation on local networks based on DHCP scopes and address pools for evidence of control over addresses in X.509 certificate extensions.
US 18/438,586
Securely harvest and distribute trusted metadata (plaintext, formatted text, metrics, images, video, audio), dynamically from single or two-factor authenticated devices to artificial intelligence (AI), with webhooks to a plurality of expert systems, with a single API in any programming language.