Distributed Cybersecurity for IoT. NOVAM ICO rating – 80 Visit NOVAM ICO site PRE ICO Dates : 10/12/18 – 10/01/19

Active ICO : 10/01/19 – 10/03/19

Business: 18 /20 Product: 1 /5 WP: 10 /10

Roadmap: 7 /10 Legal: 2 /5 ICO terms: 4 /5

Team: 18 /20 Token applying: 4 /5 Promotion: 16 /20

ICO Traffic Rank by Alexa: 2 517 654

About NOVAM ICO (token sale)

NOVAM ICO monitors entire networks, infrastructures and end points to establish full seamless views of global communications and threats. Unless NOVAM ICO was implemented from inception, we assume users, devices and networks have already been compromised – and initiate tailored action plans immediately. Whether you’re a blue chip, a startup on the rise or somewhere in between, NOVAM is the immune system no business should live without.

NOVAM ICO IS ALWAYS IN ACTION

NOVAM protects endpoints and networks by monitoring and mitigating threats automatically on global Internet of Things (IoT) devices. We also o er security teams and corporate risk management departments a forensic security investigation platform for auditing and compliance via Distributed Ledger Technology (DLT).

NOVAM operates at the bootloader level connecting IoT devices to the blockchain to insure through the hash that the operating system and hardware is uncompromised.

NOVAM’s machine learning, probabilistic mathematics, patent-pending tactics and methods can enable action without prior knowledge of the threat. Proactively, NOVAM is designed

to identify, monitor, alert and in some cases initiate an immune system response that automatically mitigates, removes, replaces or quarantines the threat.

NOVAM’s focus: Hardware vendors, software vendors and cybersecurity products.

The NOVAM Token is a utility software license that provides access to our network and platform for services that include monitoring and mitigating threats, auditing and regulatory compliance.

NOVAM ICO technology allows for system health checks for user, device and network authentication and verification purposes.

NOVAM ICO is the first Artificial Intelligence driven cybersecurity program utilizing DLT to increase the accuracy of its health check. Using machine learning and probabilistic mathematics, we plan to offer a security system that is ever-alert, always present and device agnostic.

An immune system designed to protect endpoints and networks by monitoring and mitigating threats automatically on global Internet of Things (IoT) devices, NOVAM ICO not only finds anomalies but also fixes them to boost your tech-immunity system.

As the digital evolution forces us to rethink what we know about cyber security, and shifts

in digital landscape continue to expose us to new threats, NOVAM ICO protects businesses, organizations and people with a self-healing platform that’s designed to increase tolerance as needed.

NOVAM ICO uses distributed ledger technology and AI to automatically monitor and mitigate IoT threats from the secure boot chain, operating system, mobile application and network.

NOVAM also provides auditing & regulatory compliance integration to threat monitoring and detection services to ensure system events are included on an immutable distributed ledger. NOVAM wants to become the standard distributed ledger for cybersecurity threat detection, device mitigation and compliance.

Our focus is on threat detection and analytics for companies that have customers and want the assurance of an immutable record for auditing, compliance, and investigation needs.

A NOVAM Token is used as an individual software license to access the distributed ledger capabilities, including but not limited to services of monitoring, mitigation, auditing and compliance.

NOVAM ICO intends to target major industries by creating partnerships with security vendors for immutable compliance and investigation. NOVAM ICO will also target hardware and software vendors to integrate the distributed ledger within IoT devices and enterprise networks for monitoring and mitigation services through our patent-pending system health check.

Our market focus breaks down into three distinct categories:

• Monitoring IoT devices and systems

• Threat mitigation of IoT devices and systems

• Auditing and compliance for threat monitoring platforms