Moving Target Defense
Dynamic endpoint connection build on demand via multiple virtual hubs in multi cloud vendor SD-WAN environment. We branded this as the Enclave, the goal being to prevent an attacker from obtaining, and maintaining, target lock on entry and/or exit point of the remote connection. Deployed when needed for remote access sessions, dynamically maintained during the lifetime of the remote access session and destroyed upon session termination. The endpoints remain invisible for each other providing absolute isolation of your most valued assets from the internet and keeps prying eyes far away from anything they might want to target. It is the opposite of the traditional ‘static castle’ defense implementations.
True Network Segmentation
Access to IT/OT networks is facilitated completely out-of-bound via our on-site entry point appliance not requiring any other IT/OT system or entry facility, thus protecting both IT and OT networks while providing true OT/IT segmentation
Authentication Methods
Use the Temporary One Time Passwords, Okta, our MFA + user directory solution or Active Direcory and Hardware Token integrations you already love
Full Redundancy
Geographic, vendor-agnostic, hot-swappable redundancy ensures your systems are always available
No External Internet
Grant remote connectivity through whitelisted subnets you can edit in real time. Patch management servers can be staged in the enclave to allow Operators to test their patches before pushing them down to connected equipment.
Same-Day Implementation
Make your team's life better in a matter of hours. Implementation and training takes less than a day
End-to-End Encryption
Two layers of AES-256 encryption with independent 4096-bit RSA keys protect every connection
No Endpoint Installations
Patching and updating every endpoint every year? We do not believe in that
Automatic Patching
We update our infrastructure every single day, so you are always on the latest machines
Audit & Security Support
Optional Livestreaming, Screen recording & Network Logging. Audit services can be tied back to a SIEM in the enterprise or third party SOC. Public or Private cloud assets can be connected to the enclave. Most frequently observed when tying in third-party vendor's monitoring and prognostics systems with a restrictive license into an ICS environment.
Plus, a lot more...