Security

The Virtual Invisible Network solution was described by independent US-based cyber security experts, Secure State as “amongst the most secure products in the market today” and “in line with the top Fortune 500 companies with which SecureState works.”


 
 
 

VIN eliminates the identification of users and authorises devices instead.

VIN is also device-centric,
rather than user-centric.

Computer networks are about connecting devices, not so much about connecting users. It is the user that uses a connected device to traverse the network and access the required resources. Therefore, VIN eliminates the identification of users and authorises devices instead. This is done in such a manner that blocks dictionary and brute-force attacks against the network and resources by enforcing an invitational/approval approach to registering connected devices.

The human element of this network authorisation resides with the Network Administrator whereby they are required to securely distribute an invitation to join the network and then (optionally) approve devices as they RSVP to the invitation itself. This ensures that the Network Administrator remains accountable for the inclusion of connected devices to the network and diminishes the likelihood of shared or stolen credentials to obtain unauthorised network access.

With the combination of the above security measures along with a number of other hidden measures at the network level to assert assurances of Peer identity, VIN is, by default, a far more secure virtual networking solution than any VPN solution or any SD-WAN solution that utilises VPN as a data plane.

“With the combination of the above security measures along with a number of other hidden measures at the network level to assert assurances of Peer identity, VIN is, by default, a far more secure virtual networking solution than any VPN solution or any SD-WAN solution that utilises VPN as a data plane.”