We push the limits of cryptography to deliver Decentralised Protection in the Digital World

Event Horizon is the ingenious engineering start-up that is revolutionising cybersecurity with decentralised technologies.

Horizon
+31%

Cyber Attacks in 2021

$4.2m

Average Cost of Every Data Breach

$615m

Stolen in One Single Private Key Hack

$56bn

Digital Fraud Losses in 2021

$80bn

Bitcoin Locked Due to Private Keys Lost

Why Sensitive Data Needs Protection

In 2021, the staggering cost of digital identity fraud skyrocketed to $56 Billion. Impersonation, covert operations, and blackmail are just a few of the harrowing consequences that arise from compromised IT security. In this context, exchanging sensitive and confidential data becomes a headache for a growing number of businesses. Simultaneously, the protection of digital keys faces a significant challenge: a gaping chasm between complex and costly hardware solutions on one end and vulnerable single point of failure alternatives on the other.

Event Horizon invents game changing solutions for usability and security. We tackle the cybersecurity challenge head-on by using the latest Decentralised Technological innovation; For instance by fragmenting private signing keys into separate pieces of an impregnable jigsaw, ensuring that each fragment is shielded from both hackers and inadvertent loss. Even in this decentralized state, our innovative signature algorithms seamlessly generate valid digital signatures, making them immediately verifiable by any other party.

Furthermore, our decentralised components allow to create trusted bridges between separate entities, for you to securely share sensitive data with your clients, providers, separate subsidiaries, or regulatory bodies.

At Event Horizon we understand the value of your digital security and the paramount need to protect it. Our cutting-edge approach bridges the usability gap, providing an unparalleled solution that combines security, convenience, and peace of mind.
Say goodbye to the dilemmas of unwieldy hardware and unreliable single point of failure systems: Event Horizon has you covered.

Our Mission

We invent technologies and create lean, sustainable products, protecting thousands of businesses and millions of users in the digital world by keeping their key secrets behind a digital Singularity: the Event Horizon key protection solutions.

“Event Horizon” is indeed the limit around a black hole region from which nothing (not even light) can escape. Beyond that limit is the Singularity, where nothing can be revealed, or tampered with.

The pain points we address extend from existing industries such as finance and Telecommunications to nascent sectors such as Blockchain, cryptocurrencies, the "Internet of Things" and Digital Identity on the Metaverse.

By 2025, 35 percent of Fortune 500 companies will have board members with cybersecurity experience, and by 2031 that will climb to 50 percent

Boardroom Cybersecurity 2022 Report - Cybersecurity Ventures

Your private key may be stored in an underground atomic shelter and guarded 24/7 by ex-Navy Seals. But the moment you want to buy, sell or move around Bitcoins, Ethereum or any other digital currency – you need to go online and connect your cold wallet to the internet. Once you’re connected to a PC network, you’re vulnerable to attacks

GK8 - Crypto Wallet Editor

We’re talking about a world where your personal cloud vault is effectively with you wherever you go. It won’t matter if you’re “in” the Metaverse or not; you will be connected to it.

Alastair Johnson - Forbes

If I had asked people what they wanted, they would have said faster horses.

Henry Ford

Cybercrime is expected to create about $10.5 trillion in annual costs by 2025

Vasu Jakkal - CVP of Security, Compliance, Identity and Privacy at Microsoft

By 2025, 35 percent of Fortune 500 companies will have board members with cybersecurity experience, and by 2031 that will climb to 50 percent

Boardroom Cybersecurity 2022 Report - Cybersecurity Ventures

Your private key may be stored in an underground atomic shelter and guarded 24/7 by ex-Navy Seals. But the moment you want to buy, sell or move around Bitcoins, Ethereum or any other digital currency – you need to go online and connect your cold wallet to the internet. Once you’re connected to a PC network, you’re vulnerable to attacks

GK8 - Crypto Wallet Editor

Download our Tech Paper

Download our Tech Paper to learn more about our product and how it works.