Enterprise Blockchain Struggles To Carve Out A Niche

The ‘revolutionary,’ ‘change the world’ promise of decentralised, permission less blockchain solutions (including most crypto-currencies) may be descending into a quagmire of get-rich-quick schemes, scams, and organized crime activity, but blockchain as a whole is not dead yet.

What remains above the waterline: a quieter hotbed of innovation we call, ‘Enterprise Blockchain.’ As opposed to their problematic crypto cousins, enterprise blockchain solutions are largely permissioned and centralised, thus potentially making them safe for corporate use.

These two trends are so different, in fact, that we shouldn’t lump them together under any moniker, let alone one as overhyped as ‘blockchain.’

And yet, the differences aren’t quite in the night-and-day category. Even though enterprise blockchain has an unquestionable business focus, it is still too early to tell which enterprise blockchain approaches will become viable long-term.
People like to compare today’s emergence of blockchain to the early days of the commercial Internet. However, this is a poor comparison, as the Internet’s early success depended on broad acceptance of basic protocols like TCP/IP, and for the Web, HTTP and HTML.

Blockchain has no such acceptance. Not only are there no meaningful protocol standards in the works, but there isn’t even any agreement on the best mechanisms for making blockchain work at all.
Consensus mechanisms are the best example of this problem. Bitcoin uses the ‘proof of work’ mechanism which enables the transaction processing nodes (aka ‘miners’) to battle for a reward – but ends up consuming impractically vast quantities of electricity.

In response, enterprise blockchain innovators have developed numerous alternative consensus mechanisms, each with its own strengths and weaknesses – and generally, none are interoperable with any of the others.

The Confusion over Decentralisation
Ask your average crypto fanatic what makes their coin of choice so revolutionary, and they are likely to tout crypto’s decentralisation. What they are referring to is the lack of a centralized decision-making authority. In essence, with any decentralized blockchain-based solution, no one is in control.

With centralized, permissioned blockchain, in contrast, some company or consortium of companies controls who gets to process transactions, what rules they have to follow, and also establishes some way of coming to an agreement on any changes to the blockchain technology itself.

Decentralized, however, is different from distributed. The notion of distributed applies to architectures, not decision-making policies. In fact, distributed architectures have been with us since the 1990s, as they were essential for building highly scalable Web sites like eBay are inherently distributed.

When you boil blockchain down to its basics, you end up with a secure distributed ledger – that is, a database with multiple nodes in different places, with a secure mechanism to ensure all the nodes are sufficiently in agreement with each other. Decentralisation, in fact, isn’t part of the blockchain equation at all.

Distributed Ledgers in Action
Such distributed ledgers are, in fact, hardly revolutionary. They are a useful innovation for handling a certain class of multiparty transactions – and such transactions are generally the focus of today’s emerging blockchain solutions.
I’ve covered a few enterprise blockchain startups with novel approaches to multiparty transactions before. Gospel Technology, for example, provides exceptionally granular security for data in such transactions (featured in this article).
Boardwalktech emphasizes granular transaction chaining, keeping track of each field in a complex transaction. And Interbit from BTL treats individual blockchains as virtual machines and is thus able to spawn vast numbers of ephemeral blockchains to keep track of individual transactions (the latter two featured in this article).

Some distributed ledgers coming to market may not even be blockchains, as they don’t chain blocks (not that such a distinction really matters). One example: Corda from R3, which only shares transaction data among the nodes participating in a transaction. R3 is also following an open source strategy, offering a free alternative and a paid, enterprise version that adds additional capabilities like enterprise database support, better security, and higher availability.

Incumbent software vendors are getting into the game as well. IBM has been heavily investing in Hyperledger, an open source permissioned blockchain initiative out of the Linux Foundation. For IBM, blockchain is more of a professional services play than a product offering, consistent with its long-term enterprise strategy.

Nevertheless, IBM deserves kudos for innovating ahead of clear market demand. “We didn't start with a big bang,” says Marie Wieck, the general manager of IBM Blockchain. “We had to create something new, so we started experimenting and doing some customer pilots, and we saw there was enough interest to move forward.”

SAP is also following in IBM’s footsteps with the launch of the SAP Cloud Platform Blockchain. This ‘blockchain-as-a-service’ offering focuses on Internet of Things, manufacturing, and supply chain solutions, and leverages Hyperledger as well as MultiChain, another open source blockchain effort that focuses on private chains, much as Corda does.

The Token Pitfall
IBM is also rolling out its new Blockchain World Wire (BWW) cross-border payment network, looking to facilitate international payment settlements that use multiple currencies.

As many permission-less blockchain international payment processing wannabes have discovered, one of the primary challenges of an international payments business model is representing the value of the transaction in terms of a cryptocurrency or other cryptotoken. 

There are, in fact, many problems with such tokens. In addition to the crime-related shortcomings of cryptocurrencies, tokens that blockchain businesses issue themselves have their own drawbacks as well. In general, the value of such tokens is merely speculative.

Since initial coin offering (ICO) speculators as well as founders of ICO-funded startups end up possessing large numbers of such tokens, it is unlikely their market value will ever rise to the point of fostering a working token economy, where buyers and sellers of such tokens drive an equilibrium in the market separate from speculative interest in the tokens.

BWW isn’t making this mistake. In the case of BWW, IBM is working with Stellar, a payment technology originally built upon the Ripple protocol. Ripple is yet another permissioned blockchain play, in this case focused on international financial transactions. However, while Ripple’s tokens’ market value is subject to the whims of speculators, the Stellar tokens supporting BWW are ‘stablecoins,’ that is, tokens with a fixed fiat value.

Stablecoins address the problem of speculators and founders dumping their tokens to depress a token economy, but they are really little more than stand-ins for fiat currencies – and we’ve been dealing with stand-ins for fiat since the first bank issued its own notes.

On the other hand, there are enterprise blockchain platform providers that offer tokens on the open market. SophiaTX from Equidato provides a platform for building third-party blockchain solutions with a particular strength in enterprise integration, and DECENT offers a similar platform, with tokens intended to foster an ecosystem of third-party solutions on the platform, thus building an economy providing token value beyond what a single service provider could accomplish on its own – at least in theory.

The challenge both SophiaTX and DECENT have, however, is that speculative interest drives the value of their respective tokens. Such interest puts money in their pockets via ICOs to be sure, but now presents an impediment to long-term token economy success that neither vendor knows how to resolve.

Enterprise Blockchain’s Long-Term Prospects
This article only scratches the surface of today’s enterprise blockchain initiatives – but it hopefully indicates the diversity of such efforts in terms of their technical approaches as well as their business models.
Such diversity, however, cuts both ways. The wild west-style explosion of mechanisms and architectures only shows the level of overall immaturity in the space. We can expect to see a consolidation to a small handful of such technical approaches, once the market figures out which ones work and which ones do not.

In terms of business models, furthermore, the diversity is perhaps smaller than the hype around blockchain might suggest. True, coming up with better ways of handling complex multiparty transactions is bound to lead to a vibrant market category over time. But that single market category appears to be the full extent of blockchain’s true business value.

Blockchain fanatics around the world refuse to believe it, but the long-term opportunity for blockchain falls well short of Internet-level disruption that would indicate that this technology is anything close to revolutionary.

Forbes

You Might Also Read: 

What Happened To The Blockchain Revolution?:

« Cyber Criminals Are Outspending Business
GCHQ Data Collection Violated Rights To Privacy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

PureCyber

PureCyber

PureCyber (formerly Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.