sipn business overview
TRANSCRIPT
Secured Invisible Private Network
Securing Communications
What Do Businesses Think When It Comes To
Security?
Fatigue Business Disruption
Exposure Helplessness
Lack Of Confidence
Defeat
Anger
Frustration
Violated
Futility
Empty Promises
Expensive
Snake Oil
Online Security Is Broken
15,000 Vulnerabilities Found in over 4,000 Apps
Volatile Cedar: Ongoing since 2012, 10 countries infected
Rootpipe: Infects all Apple products; No patch available
Sandworm: Launched in 2009; Discovered in 2014; Infected major utilities throughout West
Shellshock: Core flaw for over a decade; 1.1M attacks in one week of monitoring
Poodle: Obsoleted new version of HTTPS overnight
The Cost Of Insecurity
Your World Today
Home Field
Office
Internet
Corporate
Gateway
Corporate
Servers
Quasi-SecuredUnsecured
Confidential and Proprietary Property of SIPN, LLC
NOTE THE 95% UNPROTECTED COMMUNICATION LINES
2018 Cybersecurity Market: $101BWhat Is The Market?
2019 Mobile
Security Market
Size:$5.8B
2019 Global
Network Security Market
Size:$7.5B
2020 SSL VPN Market Size:
$26.62B
2016 IP VPN Market Size:$81B
2015 Cybersecurity Market: $77B
So What Are The Issues?
SECURITY IS TOO VISIBLE• Changing it causes disruptions to
businesses and users• Sitting up high restricts its
capabilities
SECURITY FOCUSES ON DEVICES• Building digital fortresses is great• But what is protecting data
between those fortresses?
(Click To Continue)
Fatigue THE NEXT BIG THING
• Surely something will work…right?• But how many major disruptions does a company
need to suffer?
WHEN WILL SECURITY LAST?• Even if something works today, it is usually obsolete
tomorrow• Why can’t technology ever adapt?
AT SOME POINT WHEN DOES THE PAIN OF PROTECTION OUTWEIGH THE BENEFITS?
A New Approach FOUNDATION FIRST
• Prior to solving current demands, a better framework is needed
SECURITY SHOULD BE INVISIBLE• You are not ask to packet your data for transmissions,
so why are you tasked with securing those packets?
WORKING TOGETHER• Security is hard and no one provider will ever solve it
all by themselves• Any truly effective foundation will enable others
Core SIPN Difference
SIPN SITS BETWEEN AN OPERATING SYSTEM AND THE NETWORK
Confidential and Proprietary Property of SIPN, LLC
ComputerComputer
Network
SIPN
Virtualization Layer
SIPN
Virtualization Layer
How This HelpsSECURITY IS TRANSPARENT• Updates do not cause business
disruption In fact, adding SIPN does not disrupt business
• Security Is Always On Experts control security, not users
• Enables A Multitude Of Security Capabilities By removing the operating system, security becomes unbound
Operating System Freedom
OPERATING SYSTEMS ARE SLOW TO RESPOND• All current security relies on operating system-
provided features• Most such features cannot change for decades due to
compatibility issues
SIPN ADAPTS IN REAL TIME• Customers control security, not Microsoft• Security is highly personalized as needed• Protection can be changed at any time with no
disruption
Enabling OthersSIPN WILL BUILD SOME• SIPN will secure data between devices• SIPN will plug holes in some basic services
SIPN WILL ENABLE MORE• SIPN will overcome limitations in
numerous network security platforms• SIPN will plug holes in major options such
as VPNs
A New (Secure) World
SECURITY BECOMES NETWORK• Security moves out of sight – where it should
be• Security can adapt without disruption
SIPN WILL ENABLE AN ENTIRE INDUSTRY• Underlay Networks• Counter Intrusion/DDoS Systems• Numerous remote security solutions
Not Just Communications
SIPN PROTECTS MODERN INTERNET• SIPN is currently the only solution that can protect
modern forms of transport over the Internet (IPv6)
SIPN OVERCOMES BYOD CHALLENGES• SIPN removes basic flaws in current overlay network
solutions
SIPN CAN EVEN MAKE MALWARE MEANINGLESS• But that is another story…
Personalized Protection
SIPN WORKS WITH, NOT AGAINST• SIPN is an adaptable solution meant to work
with other options already in place SIPN plugs the holes in VPNs SIPN overcomes limitations in popular options available today
SIPN IS MODULAR• Customers only use what they want without
having to ramp up on everything at once
Complete Security
NOTE THE 100% PROTECTION
Home Field
Office
Internet
SIPNGateway
Corporate
Servers
SecuredUnsecured
Confidential and Proprietary Property of SIPN, LLC
Let’s Talk SonyCOMMUNICATIONS KILLED• 77M accounts stolen from Sony,
costing them $100M• Two Main Failures:
Point Of Sale Unit Was Able To Talk With Deployment Server
Nobody Was Watching For Outbound FTP Traffic
SIPN CONTROLS COMMUNICATIONS• SIPN Enables Control Over Who Is Talking With
Whom, When, What Direction and Even How Devices Can Talk
Confidential and Proprietary Property of SIPN, LLC
Chasing Intruders CHASE HAS SUFFERED EXTENSIVELY
• In 2014, 83 million accounts were hacked• In 2015, Chase was part of $1B banking theft that ran for years
SAME ATTACK PRINCIPLE• While the attacks appear to evolve, they all use the same
principle• Install software, send communications to unauthorized
locations, reap the benefits
CONTROL COMMUNICATIONS• If banks controlled their communications at a fine-enough level,
these attacks would all fail• SIPN can proactively stop data from ever being transmitting to
unsecure locations
The Epic OPM Disaster
Problems And The Solution
THE PROBLEMS UNDERLYING OPM ARE VAST• Outdated software• Improper contractor behavior• Partially-completed, incongruous security systems
THE SOLUTION IS SIPN• Regardless of device, controlling communications
controls the flow of data• Centralizing communications security simplifies
complex, often disparate, on device systems• SIPN provides new framework that consolidates
seemingly disparate solutions
SIPN TodayDESKTOP APPLICATION• Runs on Windows and Linux• Mixes two of the best security options
together (AES 256-Bit and Triple DES Encryption) on same communication channel
CORE ECOSYSTEM• Major components of new foundation are built
out• Key new identification processes have been
completed
Social SIPNFOCUSED ON CONSUMER APPS• Secure Skype, Private Messenger, Impregnable
iChat• Build structure once and reuse it for all apps• Critical U.S. ISP limitation requires root access on
mobile devices
SHORT DURATION, HIGH POTENTIAL• $150,000 and 3 months for Secure Skype• Each subsequent app requires 1-2 weeks for testing• Identified several target groups with 10K to 30K
members each
Enterprise SIPNENTERPRISE EFFORT CONCURRENT• Building management team now• Technology roadmap already
developed
LEVERAGING MODULARITY• Initial targets are mid-level
organizations• Will target protection of critical
pathways first• Goal to implement customer-driven
product build out
Ready To Go SIPN?TIP OF THE ICEBERG• SIPN goes well beyond communications security to
provide a comprehensive enterprise solution• SIPN provides an adaptable framework that enables a
range of new opportunities for other providers
SECURITY NEEDS SIPN• SIPN is transparent to operating systems, business and
users• SIPN resolves core problems that enable hackers today• SIPN can provide immediate solutions for pressing
business demands
Confidential and Proprietary Property of SIPN, LLC
For The Tech Folks
3 ProngsOPERATING SYSTEM ISSUES• Constrain how encryption is implemented• Prevents adaptation to ever-changing security needs
SESSION INITIATION• Trying to pass secrets over unsecure lines does not
work
OVERLAY NIGHTMARES• Overlay networks have potential• User disruption and gateway bottlenecks are major
obstacles
Common Flaws ALL ENCRYPTION TO DATE IS BASED WITHIN
AN OPERATING SYSTEM• SSL, IPSec are just layers in an OS
IF A VULNERABILITY IS FOUND IN ONE PRODUCT, ALL SUFFER• Thus when Heartbleed hit, all SSL VPN customers suffered
CORRECTING ISSUES IS DISRUPTIVE• Operating system upgrades, system overhauls and yet more
intrusive security• It seems that these approaches are digging ever-deeper holes
Confidential and Proprietary Property of SIPN, LLC
SIPN Sits Below An OS
SIPN IS ADDING A NEW VIRTUAL LAYER
SIPN SITS BETWEEN AN OS AND THE UNDERLYING NETWORK HARDWARE
Application Layer (Http/s, FTP, DNS,…)Presentation Layer
(MIME, XDR)Session Layer (PPTP, SOCKS, NetBIOS)Transport Layer (TCP,
UDP, SCTP)Network Layer (IP (v4/6), IPsec)
Data Link Layer (mini-Port Driver)Physical Layer
(Network Card)
SIPN Virtualization Layer
Ope
rati
ng S
yste
mPh
ysic
alOSI
Sta
ck
Confidential and Proprietary Property of SIPN, LLC
Operating System Freedom
NO MORE LIMITATIONS• Mix and match encryptions• Reduce communication protection to centrally-
administrated policies• Change encryption at any time without major
installs
TRANSPARENT• Works under network/system admin tools• Transparent to operating systems, applications,
users and businesses• SIPN has run under application security and VPNs
Confidential and Proprietary Property of SIPN, LLC
Confidential and Proprietary Property of SIPN, LLC
Out Of BandMODERN PKE IS FLAWED• Trying to pass messages over unsecure lines does not work• Almost all major flaws stem from some sort of public key
exchange issue
SIPN WORKS OUT OF BAND• Using a patent-pending n-level authentication mechanism,
SIPN separately authenticates devices and users• Then leveraging Kerberos in a cross platform manner, SIPN
establishes secure sessions without ever sharing secrets in an insecure manner
(Animations available upon request)
Confidential and Proprietary Property of SIPN, LLC
Underlay NetworkOVERLAY NETWORK LOGIC
• Premise is to provide higher-level cohesiveness to account for challenges such as BYOD
• Sitting on top of a network requires visible single points of failure
SIPN SITS UNDERNEATH• SIPN provides the ability for overlay networks to become
transparent• By sitting underneath, SIPN uses a centrally-managed,
distributed peer model to eliminate bottlenecks and user disruption
• Current overlay providers can plug into this system and utilize their expertise to provide a new type of enterprise solution
Underlay Benefits AUTHENTICATION
• Imagine being able to authenticate by user and device• Imagine creating rules based on dynamic options such
as connected network and/or geographic location
AUTHORIZATION• Imagine treating communications like another resource• SIPN provides the ability to control when, where and
how devices can talk with one another
ACCOUNTING• Imagine being able to guarantee delivery – especially
important in QoA environments
True Security Platform
OPEN ENCRYPTION PLATFORM• SIPN can support any type of encryption – both now and in
the future
PLUGGABLE FRAMEWORK• SIPN can support a myriad of solution providers:
Counter Intrusion Vendors VPN Providers Overlay Network Providers
SIPN WORKS WITHIN BOUNDARIES• SIPN provides a unique ability to support network and
system admin tools without having to turn of encryption