SocketZero, a Zero Trust technology that allows organizations to securely enable users to access private network resources without being on/inside the network or altering network topologies. It uses continuous authentication to vet the authorization privileges of the user and only allows them to connect to resources on a need-to-access basis through encrypted tunnels. This unified zero trust architecture provides significant benefits to warfighters by ensuring secure and reliable access to mission-critical information across all data and infrastructure, regardless of their location. 

How SocketZero works. SocketZero has two main components: the client and the receiver.

  • Client.  The client is installed on a user’s laptop or computer and is intended to support multiple operating systems: MacOS, Windows and Linux.  The client is intended to be user friendly and is the main entry point for users to access applications.
  • Receiver.  The receiver is set up by an organization’s infrastructure team either on a Kubernetes Big Bang cluster or another server based infrastructure.  The receiver is also the centralized point of configuration for applications, role based access.

Key advantages of SocketZero. The following lists other key innovative commercialization features of SocketZero:

  • Eliminates the need for virtual private networks (VPN).  VPNs are highly permissive and don’t allow for micro segmentation.
  • Introduces the concept of continuous vetting for both a person and a device.  This means continuous validation of the security posture of someone connecting to an asset.
  • Disguises traffic as HTTPS traffic which makes it difficult if not impossible for an adversary to discover.  
  • Allows for any TCP or UDP based network connected application to be privately hosted but publicly accessible without compromising security.
  • Works with the known and adopted standard of Container Orchestration platform Kubernetes.  SocketZero works already with the Air Force standard Kubernetes Big Bang and Iron Bank hardened image which enables a CTF and/or ATO.  
  • Encrypts all traffic regardless if it’s already encrypted or not.  If it’s already encrypted, it’s doubly encrypted.

Receiver Installation / Information

Big Bang Helm Chart

Repo1 Iron Bank Source Code

Iron Bank Repository

VAT

For more information and/or a demo contact us: