Our Deflects Eliminate The Defects Of Legacy Internet Networks

21

FEBRUARY 2017

By: Douglas V. Dimola

When discussing our Dispersive™ Virtualized Network (DVN), we often refer to a deflect. It’s not a term common to networking, but it’s a concept that has revolutionized networking.

A deflect is a cloud-hosted server that allows us to create a virtual network overlay to the Internet. The deflect’s influence on routing maximizes security, performance, and reliability.

Here’s how.

Legacy networks use a single path to connect clients to servers. Each server must have an open port to accept these connections. Data traffic between source and destination is secured through IPSEC tunnels that utilize a single encrypted path.

Our deflect opens the door to a virtual network overlay with a security-first approach. A DVN routes your session-layer traffic over multiple, independent paths across the Internet. Each path has a unique, negotiated encryption key. Paths change periodically with a new key for each path.

These deflects enable DVNs to strengthen your network perimeter. This software-defined perimeter moves the attack surface away from your valuable enterprise network to these no-value targets in the cloud.

Our network’s ability to transfer data across many paths leads to quantifiable and measurable performance gains. Carrier partners have measured 3x boosts in performance over their own global networks.

By using strategically placed deflects in the cloud, you can take advantage of multiple links and landing cables around the globe. Deflects empower routing to move away from congestion and “lossy” links. The resultant performance gains can help you save money through a more effective use of “paid for” network bandwidth.

The deflect is a powerful addition to the networking suite. With a DVN, you can now transport mission-critical data reliably and securely across the Internet.

Maybe it’s time you started using the Internet the way it was intended. For more information on how Dispersive or one of our carrier partners can make that happen, email us at info@dispersivegroup.com or call us at (844) 403-5852.

 

Similar Blogs

Critical Infrastructure On Edge: Colonial Pipeline Is Only the Latest Example of the Massive Risks Associated with Attacks

Critical Infrastructure On Edge: Colonial Pipeline Is Only the Latest Example of the Massive Risks Associated with Attacks

This past week Colonial Pipeline company, which operates a pipeline that carries gasoline, diesel fuel, and natural gas along a 5,500-mile path from Texas to New Jersey, was forced to take itself offline after being attacked by a criminal cyber gang. The pipeline, which carries 2.5 million barrels a day, nearly 50% of the East Coast supply of diesel, gasoline, and jet fuel, is still working to restore service and gain access to their systems after the malicious cyberattack, while its four mainlines remain offline.

read more
Financial Services Companies Struggle With The Work from Home Digital Perimeter With Serious Cyber Attacks on the Rise

Financial Services Companies Struggle With The Work from Home Digital Perimeter With Serious Cyber Attacks on the Rise

When pandemic lockdowns turned many jobs into work-from-home almost overnight, some industries experienced relatively seamless transitions; however, the banking industry was not one of them. These institutions were forced to pivot from traditional office environments, but the switch to remote working came with an abundance of challenges, the most serious being cybersecurity.

read more
Securing Retail and POS Endpoints Efficiently

Securing Retail and POS Endpoints Efficiently

With physical retail re-opening, large retailers with hundreds or thousands of locations are rethinking their security strategies, especially when it comes to Point-of-Sale (POS) systems.

Retailers need reliable, resilient networks, as downtime leads to slow checkout lines and unhappy customers.

read more