If IoT is ever going to work, networks will need to grant access to devices that today we’d refuse outright.

The challenge before us is nothing short of reinventing security.

Our Security works

Relevant Security has developed applications for using RPM to secure IP networking, VPN, WAN optimization, Web traffic, email, instant messaging, file transfer, VoIP, mobile data, mobile commerce, mobile communications, enterprise search, and enterprise data security.


with near real-time performance improving, network operation


10KB code size so security can be embedded in any device and any protocol


supports true federated trust, allowing you to place trust nodes in any topology to support secure peer-to-peer or network transactions


to understand, validate, integrate, use and maintain

More secure

using continuous authentication, securing every transaction

Real Privacy Management™

Introducing RPM™, lightweight cryptography for providing security and privacy for any device on any network.

Real-Time Continuous Mutual Authentication and Encryption

RPM is an advanced, secret key-based continuous mutual authentication and security method, including lightweight stream ciphers. RPM was built to secure transactions and data from any variety of servers and devices, including sensors, IC, ASIC, SoC, embedded systems and the Internet of Things (or Everything). RPM is lightweight, stronger and faster than traditional security methods.

Benefit from RPM security

RPM is faster, smaller, more efficient, and more flexible than other security techniques. RPM has been tested by an independent lab to be hundreds of times faster than other algorithms. This performance allows RPM to be used where other techniques fail, such as time constrained applications like embedded systems, mobile, and RF protocols that require fast connection speeds.

The speed of RPM is what provides the ability for continuous authentication and encryption. RPM is able to authenticate both parties (mutual authentication) for every transaction of any application due to the speed at which the authentication is performed. RPM is fast enough to mutually authenticate and encrypt every packet in protocols like TCP, UDP, SIP, IP, etc.

The RPM authentication process is done in 5 microseconds in software. VHDL and Verilog simulations show that RPM operates at line speed when used in FPGA (Field Programmable Logic Arrays), ASIC (Application Specific Integrated Circuits),  IC (Integrated Circuit) or SoC (Sytem on Chip) implementations.

RPM is also much smaller than other security methods. Since the RPM libraries are 10KB or less in size they can easily be integrated with applications requiring security, while coserving space. This small size allows RPM to be placed in embedded systems like RFID, IC, SoC (Systems on Chip), ASIC and FPGA.

RPM performance has very little overhead. Measurements have shown that RPM performs at 2 – 5% network overhead with TCP/IP, which is within the typical “noise level” of IP network transmissions. So using RPM does not add additional overhead for the continuous authentication and security that RPM provides.

RPM is also more flexible in its trust model. Applications have different trust models based on the network topology, business logic and information processing that the application is representing. RPM offers the flexibility to add authentication and security to any network and communications topology, whether peer-to-peer or a trusted communications network.

RPM gives your business flexibility in implementing trust according to your own business model, without requiring third parties.

Get RPM for your application.

About us

Relevant Security Corp provides Real Privacy Management™ (RPM) technology that offers transaction-level continuous, mutual authentication and security for data and electronic communications between all nodes on any network.


Relevant Security Corp. 
990 South Broadway, Suite 300 
Denver, CO 80209

Corporate Headquarters

Greg Byles