About Waverlay Lab
Founded in Leesburg, VA, in 2012 by cybersecurity expert Juanita Koilpillai (1963-2021), Waverley Labs has grown from a government-focused cybersecurity consulting firm advising key agencies to a mature, full-service cybersecurity provider.
Based in Florida, Waverley Labs is widely recognized for its technical expertise in security. We regularly provide cutting-edge security services and solutions to a variety of industries, demonstrating our ability to identify and mitigate vulnerabilities with technical precision and efficiency.
While our early contributions included working with the U.S. National Institute of Standards and Technology (NIST) to create cloud computing standards and serving on FEMA’s Enterprise Security Management Team, we have increasingly focused on meeting the evolving cybersecurity needs of the private sector. As a trusted advisor to enterprises, Waverley Labs specializes in complex technical information security solutions that span vulnerability identification, penetration testing and comprehensive cybersecurity consulting.
Our extensive work in government has also given us unique insights that benefit our customers. Key projects include
RESILIANT™ : Zero Trust cybersecurity
In partnership with RESILIANT, we have developed an innovative technology based on the Zero Trust approach, Identity and Access Management (IAM) and Blockchain. This revolutionary approach challenges traditional trust paradigms in IT security.
Our solution ensures that every user, device and application is continuously verified, regardless of its position in the network.
IAM plays a central role in managing identities and access, while Blockchain technology strengthens security by establishing trusted relationships between previously untrusted entities
Blockchain and AI-based ldP and IAM solution for enterprises
As we move towards a more digital society, how we manage access to information systems and protect and verify the identity of those accessing these critical assets will be crucial to ensuring security, trust and privacy in all aspects of our online lives.
Since 2019, Resiliant has pioneered the development of a Blockchain and AI-based ldP and IAM solution for enterprises that enables an end-user to securely access multiple services using a single digital identity while protecting the end-user’s privacy, while guaranteeing the security of these services and systems.
Resiliant ID, Resiliant Open Connectors and Resiliant Journey-Time are the foundations that answer simple questions: Can you identify an end-user, whether virtually or in person, and then create policies that dictate where, how, when and what that individual can access?
Secure your business,
Improve your productivity
Protect your customers and employees
Leverage Blockchain technology and AI for authentication and authorization.
-Powerful IAM and IDP capabilities with a low/no code identity orchestrator. This fusion enables effective personalization of identity journeys, improving user experience and meeting diverse business needs.
Drag-and-drop low/no code policy orchestration: Build workflows (journey times) to know who can access what, when, where, why and how.
Digital identity, unlocking the potential of autonomous identity (SSI), NO personally identifiable information (PII) stored, and ZKP (zero-knowledge proof) for identity verification results.
Strictly secure on-boarding: 100% certainty that the individual is the person to whom his or her digital identity has been issued. Compliance with KYC (Know Your Customer) banking standards.
-Verification of virtual/cyber identity, authentication and access as well as physical access with the same solution.
Blockchain-based: the ONLY digital identity using blockchain.
-Granular and flexible Geo-Fencing: Ability to determine the user’s location, based on an access authorization or denial policy.
RESILIANT™ : some use cases
Onboarding of public and corporate users (forgery-proof credentials), Apply user segmentation to high value assets (ABAC and RBAC), Migration from Perimeter Security to User and Application, Provide superior security and ease of use for public infrastructures, Remote access to applications, Security/Migration to the Cloud, Secure or replace VPNs, Secure application-to-application access, Security compliance/auditing (access, logging, tracking), DevOps :Dev in the cloud: Securing application development, Security-ready network/application (Kubernetes-ready), Securing IoT access Ransomware: (mitigation and recovery)