Operating on the Internet creates a cyber threat to those who may want to conduct discrete market research, business intelligence collection, or establish private or privileged client communications channels. The simplest online activity leaves a “footprint”. Anyone using the Internet “unprotected” exposes their IP (Internet Protocol) addresses and network identities, making high interest users such as banks and national infrastructure providers, a potential target.
Cutting Edge has developed the NetAbstraction Network Service to address these issues and felt that there was a need not only in the government, but commercially, for the ability:
To achieve this protection, we have to look at the cyber problem differently. We can no longer rely on reactive defensive fortifications. Digging the moat deeper and building the wall higher just won’t cut it. We need to be proactive. We need to be mobile.
Because if they can’t find you, they can’t attack you!
We have identified and implemented NetAbstraction to support some core Use Cases:
NetAbstraction is a patented implementation of Software Defined Networking technology that allows us to provide a flexible and mobile network across and on top of the commercial provider’s networks.
Netabstraction is our premier privacy service, which anonymizes and protects your company's identity, geo-location, and systems by implementing unique, software defined, secure virtual private networks within and across commercial clouds. NetAbstraction provides you with a low profile, alternate IP address identity for accessing the Internet; secure isolated connectivity for privacy protected communications; non-affiliated protected hosting; and a dynamically shifting network with multi-layers of security so you are not a static target.
We provide resilient, "out-of-band" crisis communications network capabilities to support your critical business operations and maintain protected communications in the event of a cyber incident, natural disaster or catastrophic event.
We work with your IT staff to identify vulnerabilities in your existing network connections and recommend mitigations. We provide complete turnkey implementation of new cyber protective capabilities as well as regular ongoing cyber threat evaluations for your network.