HC-SDN Overview
HC-SDN, the disruptive technology from Hidden City Solutions, is a software package designed to create secure, closed network environments using the public Internet. HC-SDN has been battle-tested and proven by some of the best pentesters/hackers in the business; supporting the claim that HC-SDN stops ethical and non-ethical hackers alike. Hackers have taken their shot at penetrating, capturing, or disrupting HC-SDN end points (known as nodes), communication between nodes, and the communications themselves, with all attempts ending in failure and frustration for the attackers. HC-SDN remains solid and undefeated after attempts from groups including the representatives from multiple government agencies both foreign and domestic, as well as, groups with less than honorable interests.
How does HC-SDN accomplish a feat which most in the industry believe impossible? We, at Hidden City, listened to the actual creators of the Internet and fixed what they identified by as underlying critical flaws in the architecture of the Internet itself. John Postel stated that they had failed to create the ability “not to listen”. HC-SDN provides the ability to ignore all traffic not intended for a specific node which in turn allows nodes to communicate freely amongst each other while simply not listening to any other communication attempts. Hidden City realized the need to take this one step further by protecting the communications between nodes while allowing those protected to freely use all Internet protocol mechanisms. Our people at Hidden City understand your risks, and we make certain you can work , while we insure your privacy and security.
1. Secures nodes from unauthorized access
2. Prevents nodes from sending to unauthorized recipients
3. Allows communications across all ports between authorized nodes
4. Provides protection with very little overhead
5. Uses multiple industry encryption algorithms in a manner where the combination of algorithm, key, and key length never repeat
6. Changes algorithmic encryption, keys and key lengths as often as every packet and supports nodes with different timings
7. Nodes remain silent during unauthorized scans creating the appearance of cloaking
8. Event driven functions can be used to create reports or take immediate action when attempted foul play is detected
Tools used during the attempts to defeat HC-SDN include, but were not limited to, BackTrack, OpenVAS, and a myriad of manual tools and techniques many of which were not divulged to us. Representatives from FBI, NASA, DoD, and a multitude of others have had unfettered access both from remote locations, as well as being provided full access to a device within the Hidden City network environment in attempts to defeat HC-SDN.
Today Hidden City uses HC-SDN to protect corporate and government network environments, allowing for communications systems to use the Internet securely without compromise and with assurance that all corporate and govenment communications are safe.
As with all new technologies, new vocabulary or at least new ways of identifying objects and techniques are required with HC-SDN. Once you have these concepts and terms under your belt, deployment and management will be a breeze!
A node is a device which speaks using the Internet Protocol (TCP or UDP) on which the HC-SDN can be deployed to protect the network perimeter of the device and secure transmissions to other HC-SDN nodes. A singular node is a solid bastion against network based intrusion.
Nodes are grouped in security zones. As shown in figure 1 below if Node A is in Zone 1 and Node B is in Zone 2, Node A and Node B will not be able to talk to one another.
Should both nodes be in the same zone, both may communicate freely with the other as shown
More complex environments may desire to implement Zones in a hierarchical fashion as illustrated below. An explanation of the communication rules at play follow the figure.
Some Features to Consider
The Hidden City HC-SDN, is a software defined network and security framework. HC-SDN protected computers and associated network segments are undetectable and undecipherable. HC-SDN provides four–factor authorization and asymmetric and symmetric swapping between participating devices in a true independent peer–to–peer model.
The HC-SDN Offers:
A few of these features exist in other solutions as standalone features. Hidden City’s HC-SDN is the only framework that uses them all in a holistic solution that is not dependent on other software or hardware to provide future-proof protection that is available NOW. With its advanced features and customizable options, HC-SDN is designed to meet the mission critical security requirements to protect national infrastructure and commercial enterprises.
If you're looking to enhance the security of your existing IT infrastructure, integrating HC-SDN's out of the box end-to-end Zero Trust security can provide numerous benefits. Here are some of the key advantages of integrating HC-SDN's Zero Trust security solution with your existing investments:
1. Comprehensive Security: HC-SDN's Zero Trust security solution provides end-to-end security across the entire network, which means all traffic is secured from end to end. This approach ensures that your network is protected against all potential threats or vulnerabilities.
2. Cost-Effective Solution: HC-SDN's Zero Trust security solution is designed to be easily integrated with your existing IT infrastructure, which can help reduce the overall cost of your security. You don't have to spend additional money on new hardware or software to implement Zero Trust security.
3. Flexible Solution: HC-SDN's Zero Trust security solution is highly flexible and can be customized to meet your specific security needs. You can choose from a range of security policies and controls, including application segmentation, micro-segmentation and more…
4. Compliance: HC-SDN's Zero Trust security solution is designed to help organizations comply with various industry and regulatory standards, including PCI DSS, HIPAA, and GDPR. This ensures that your organization remains compliant with relevant security regulations and standards.
In summary, integrating HC-SDN's out of the box end-to-end Zero Trust security with your existing investments can provide numerous benefits, including comprehensive security, cost-effectiveness, flexibility, and compliance. Contact HC-SDN today to learn more about how their Zero Trust security solution can help secure your network.
HIDDEN CITY LLC
Copyright © 2023 HIDDEN CITY LLC - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.