Our Technology

Why are computer systems being attacked? Because the attackers believe that their attacks will succeed and succeed with little risk of retribution. This is the current dynamic.

From a strategy perspective, it often looks like the attackers have the upper hand; for a given target, the attackers need to only succeed once, while the defenders must successfully defend and protect their system every time. A single failure in the defense of a computer system allows an attacker in. This certainly looks grim for the defender, especially with the resources that are available to attackers.

But this model only holds when the protections of the systems under attack are static, and the risk of retribution is small. The attacks made against a system are based on what is known about the system. Just as a defender is challenged to anticipate a new form of cyber-attack, an attacker has an even greater challenge in anticipating new forms of cyber defense. It is in the introduction of new forms of cyber defense that the defenders have the advantage.

By authenticating identity and implementing security policy at the earliest possible time – on the first packet of a network session setup – Invisinet provides deterministic, scalable and cost-effective cyber defense.

Transport Access Control

Invisinet Transport Access Control (TAC) provides a new level of cyber defense for network and cloud resources. TAC operates pre-session establishment, is address and topology independent, supports NAT and automatically adjusts to changing network topologies. Cyber-attacks are stopped dead in their tracks by preventing unauthorized users and attackers from performing reconnaissance of network and cloud resources, and by denying them the ability to communicate anonymously.

Invisinet TAC uses a highly scalable, non-interactive authentication protocol that does not rely on signatures, sandboxing, or deep packet inspection. By operating at the transport layer, Invisinet is compatible with your existing network and security technologies and middle boxes, address and topology independent, and supports NAT. Invisinet TAC works across network boundaries and automatically adjusts to changing network topologies, ensuring that systems are secure end-to-end in enterprise and hybrid cloud environments.

First Packet Authentication

Invisinet First Packet Authentication inserts a cryptographically generated single-use identity token on each side of a TCP/IP session without impacting TCP compatibility. When TAC receives the connection request, it extracts and authenticates the identity token (First Packet Authentication) and applies a security policy — forward, redirect, or discard — for the connection request based on the TAC identity.

This new model of identity-based protection operates at the earliest possible time to block unauthorized or unidentified traffic on your network.

Secure Legacy Environments

The hardware systems used in OT environments typically have an operational life of a decade or longer. Organizations are challenged with operating and managing critical infrastructure incompatible with modern network security technologies and vulnerable to today’s cyber threats. Invisinet allows organizations to start securing their OT networks today – either by installing the TAC-ID device into the network or integrating our TAC software endpoint in their current infrastructure.

TAC Identity

The Invisinet TAC Identity Device (TAC-ID) provides identity for authenticating network connections for both new and legacy equipment in factories, hospitals and critical infrastructure architectures, and it supports the secure convergence of OT and IT networks.

How it Works

The Invisinet TAC Identity Device (TAC-ID) can be deployed as a hardware device, or alternatively as software running on an existing controller.  This provides secured identity for authenticating network connections. The TAC-ID inserts authenticated identity on behalf of an attached IoT device and secures the network traffic whether unidirectional or bidirectional.

Invisinet Enterprise Manager

Security operations and network security managers are looking for a secure and simplified solution to centrally manage Invisinet gateways and endpoints with an intuitive dashboard and configuration capability. The Invisinet Enterprise Manager (IEM) provides a unified console to configure and manage gateways and endpoints with a few simple clicks of a mouse. Designed from the ground up with simplicity to optimize user experience while maintaining a strong security architecture, the IEM empowers a security manager with easy-to-implement rules and policies, and simple configuration setups with a single point of management access. Setup and control of Invisinet gateways and endpoints can be completed in a matter of minutes with complete control.

Scroll to Top