Our Innovative Approach:

Setting new benchmarks for performance and security.

Future-ready networking. A unique multi-cloud and multi-path network technology.

Our virtual networking approach is comprised of software components that channelize, route and accelerate application data to significantly enhance network security, reliability and performance across branches and devices including laptops, tablets, phones and IoT.

Our Innovative Approach

Dispersive™ Virtual Networks is a patented, multi-path software-defined networking, military-grade overlay solution.

Our approach comprises software components that collaborate and route traffic to significantly enhance network security, reliability and performance among all your devices including laptops, tablets, mobile, and IoT.

Beyond SD-WAN: Faster, More Secure and Resilient

A DVN deployment is composed of three fundamental components: end point clients/gateways, strategically placed deflects, and controllers.

Data streams are split at the authenticated source and re-addressed with a Dispersive™ Virtual Network (DVN) header to force traffic to follow different network paths based on instructions from the Dispersive™ Virtual Network (DVN) Controller across one or more physical circuits.

The underlying IP networks deliver these packets to Dispersive™ Virtual Network (DVN) software nodes known as data Deflects. Placement of these deflects influences the actual physical paths traversed.

New paths can be established/rolled during the transmission enhancing performance by avoiding link failures and bypassing congested pathways.

The data Deflects receive the packets and re-address them for the final destination.

The authenticated destination reassembles the split packet streams and strips out the Dispersive™ Virtual Network (DVN) header information before passing the original packet to the receiving application. Missing packets are re-requested to ensure guaranteed packet delivery.

Data streams are split at the authenticated source and re-addressed with a Dispersive™ Virtual Network (DVN) header to force traffic to follow different network paths based on instructions from the Dispersive™ Virtual Network (DVN) Controller across one or more physical circuits.

The underlying IP networks deliver these packets to Dispersive™ Virtual Network (DVN) software nodes known as data Deflects. Placement of these deflects influences the actual physical paths traversed.

New paths can be established/rolled during the transmission enhancing performance by avoiding link failures and bypassing congested pathways.

The data Deflects receive the packets and re-address them for the final destination.

The authenticated destination reassembles the split packet streams and strips out the Dispersive™ Virtual Network (DVN) header information before passing the original packet to the receiving application. Missing packets are re-requested to ensure guaranteed packet delivery.

The Dispersive™ Virtual Network (DVN) Operates Securely Over Any Combination of Clouds, Physical Networks, Edge Devices, and Applications/Services.

The Dispersive™ Virtual Network (DVN) Difference:

Going Way Beyond Traditional SD-WAN

It’s Faster

Your Data Gets from Point A to Point B Faster:

  • All traffic is divided into separate, independent packet streams that are each sent simultaneously across different micro-segmented, individually encrypted paths across the internet from authenticated sources to destinations.
  • If congestion or an attack anomaly is encountered the encrypted data packet rolls to a new unimpeded path to optimize your connectivity.
  • The Dispersive™ Virtual Network (DVN) ensures guaranteed packet delivery with improved service experience.

More Secure

Protecting Your Network Through:

  • Improved network security while replacing a MPLS network with Internet and broadband connections that extend to any IP connected device.
  • The Dispersive™ Virtual Network (DVN) distributes traffic across dynamically changing pathways to avoid DoS, DDoS, and Man-in-the-middle attacks.

The Tech:

  • Deflects are programmable to reflect the level of security and agility each client needs.
  • Deflects: Software acts as a waypoint and relays traffic between clients or edge endpoints along the independent pathways in the Dispersive™ Virtual Network (DVN). Deflects can authenticate user data but cannot decrypt payload.
  • Dispersive™ Virtual Network (DVN) Encryption: User data encrypted and decrypted only at endpoints using endpoints negotiate keys.
  • Endpoints only call out which obfuscates their presence.
  • Endpoint App: Software at the edge that enables the Dispersive™ Virtual Network (DVN) on mobile phones, laptops, servers, and IoT devices.

More Reliable

Get Your Packets Delivered!

  • All services are segmented, monitored and managed independently.
  • QOS is applied to each service to insure critical traffic is treated with highest priority.
  • Path diversity is provided with multiple cloud and network partners options to create core/carrier diversity.