Invisinet

Stop cyber-reconnaissance and secure your existing OT, IT, and cloud operations by eliminating access to your IT and OT resources. Cloak network assets from unauthorized access, enforce identity based access to critical applications, devices and infrastructure, AND deploy granular , dynamic, identity-based micro-segmentation WITHOUT network changes.

Why invisinet?

Developed via a Department of Defense contract to cloak IP Connected devices used in the Afghanistan war, INVISINET stops cyber-reconnaissance in its tracks!

Identity security is crucial to securely authenticate and control who and what systems have access to databases, cloud environments, OT devices and other sensitive resources. Currently, identity enforcement happens at log-in ... after a user is at the "front door" of the resource, asking for permission to connect. Unfortunately, during the connection process, quite a bit of information can be exposed even if the username and password to the resource is unknown to an attacker. Attackers can: scan firewall ports for openings, understand the type of resource, where the resource is, and determine OS and patch levels to attack vulnerabilities,

INVISINET doesn't believe that the "front door" to a critical resource should be seen by
anyone unless they're specifically authorized to access it. INVISINET enforces Identity before connecting to a resource ensuring that protected systems are undiscoverable to unauthorized users and systems.

Using patented First Packet Authentication and Transport Access Control technologies,INVISINET acts as a Virtual air-gap by inserting “identity” at the earliest time possible - at network session setup - cloaking critical assets from attackers as well as employees without proper authentication. INVISINET works within traditional network and cloud environments, does not require changes or reconfiguration of existing networks, and is easier and less expensive to deploy than additional firewalls or DPI platforms.