Simple and Radically Secure Networks
We believe the cause of network complexity and exploits is the common use of non-verifiable attributes, like addresses and ports, to determine network communication and access control. They also frequently change making machine-to-machine connectivity across address realms complicated and often impossible.
The absence of strong cryptographic identity and authentication in the network stack has meant that our systems cannot verify and prove the source or destination of network communications and data. As a result, bad actors have been free to probe, roam, and exploit our networks with alarming frequency and sophistication.
Our objective was to eliminate the symptoms by tackling their root cause; the absence of immutable identity and authentication in the network stack.
With native identity and authentication, a networked thing could enforce access control by allowing or denying communication with its peers based on their immutable identity and mutual authentication.
This capability would not only eliminate categories of exploits but it would be much simpler for machines to be connected across address realms. Secure end-to-end connectivity would be restored without having to change the underlying network.
Making the Impossible Possible
Our customers deploy overlay networks in minutes that can't be spoofed or accessed by unauthorized machines, even if a machine or user possessed valid application or user credentials.
They have evolved their networks beyond defining access on mutable addresses and ports that trust everything, to a network based on Zero Trust which trusts nothing and requires mutual authentication between peers before access is allowed.
By making it non-disruptive to deploy a Zero Trust overlay and simple to orchestrate policy, our customers' design and run networks that mere mortals can manage and hackers can't see.