All You Need in One Place
NOVAM was inspired by the human immune system to change the way we think about cybersecurity, in an agnostic, autonomous, self-detecting, self-healing approach.
Audit & Regulatory Compliance
Device and System Mitigation
Frequently Asked Questions
1. What is NOVAM
NOVAM was inspired by the human immune system to change the way we think about cybersecurity, in an agnostic, autonomous, self-detecting, self-healing approach. Our goal is to protect IoT devices in connected environments with connectivity, security, scalability and adaptability in mind.
2. Why was NOVAM Started?
NOVAM was started when the founders came to the realization that cybersecurity, IoT, DLT, and AI can compliment each other in a secure and auditable way. Research started in 2016 after the founders spoke to a global telecom about the impact of the Mirai botnet.
3. What does NOVAM offer?
At the core NOVAM monitors and mitigates Internet-of-Things (IoT) cyber threats using a combination of distributed ledger technology (DLT), artificial intelligence (AI) and system defense techniques.
5. Is NOVAM open-source?
The NOVAM Network consists of developer SDK/APIs for integration into active products and services.
6. Are you using blockchain?
We are not using a traditional blockchain architecture like Bitcoin or Ethereum. We are using a Directed Acyclic Graph architecture for security, scalability and interoperability with enterprise systems.
7. What is the difference between a Light Node and Full Node?
The IOTA GUI makes it possible to choose between a Full Node and Light Node. The Full Node automatically runs an IRI instance in the background, which in turn means that you need neighbors in order to participate in the Peer-to-Peer network to synchronize with the Tangle. If you run the Full Node, you have no “trust requirements”, as you are completely and independently participating in the network. The Light Node makes it possible to connect to a remote Full Node (whether it is your own Full Node, or someone else’s publicly provided), in order to get the latest state of the network, most importantly fetching two transactions for validation which are required for issuing a transaction. When running a Light Node, it should be noted that your seed never leaves your wallet, you are still required to perform the Proof-of-Work, and all the sensitive work (such as signing) is done client-side. It also should be noted that the public Full Node providers are often overwhelmed with Light Node requests, so in order to reap the full benefits of the IOTA feeless and fast transaction settlement and data integrity technology, it is recommended to run a Full Node and not have to rely on the public Full Node providers (think of it like hitchhiking vs. having your own car).
8. What's the difference between a Blockchain and a DAG?
While a Blockchain and a DAG both used variations of DLT, they are implimented in different ways. The main differences are that in a Blockchain transactions are approved in blocks where each block points to the block that occured directly before it, but in a DAG each transaction is processed independently and they just have to point to previous transctions (2 in NOVAM’s case) which creates more of a web structure. The DAG implementaiton allows for transacitons to be approved faster, as there is no need to wait for the next block, easier to scale, and cost less work per transaction.