Service | Description | Contract Length | Starting Price | Tags |
---|---|---|---|---|
Secure end-to-end network | We will develop an ultra highly available, secure network that interconnects with your branches, significant peers, cloud services and infrastructure, optionally with a complete chain of physical network custody through the use of dark fiber backhaul links. VPN based on end-to-end connectivity to critical peers using a combination of on-net and off-net technologies for unbreakable and extremely secure HA. In consideration to security over performance, we may optionally make use of proprietary encryption technologies with multiple layers of encryption. This service makes use of multiple technologies including Cloud interconnect services, Enterprise Peplink VPN routers, nearby datacenters, tunnel/site-to-site link to nearby static routes with various other critical peers. | 2 - 10 year | $250K - $2M/y | SMB, enterprise, government, security, infrastructure, network, advanced security, proprietary, encryption |
Proprietary operating systems and software | We will license and support our in-house operating system, based on a derrivative of the Linux kernel, to you. This is the ultimate strategy to avoid security incidents, by having never before seen software unknown to the attacker. The operating system is compiled from scratch with all major components changed out (e.g. rename root, sudo). Additional hardening and customizations will be performed as part of the contract, based on your use case. | 1 - 10 year | $1M/y | enterprise, government, security, infrastructure, software, advanced security, proprietary |
Proprietary encryption library substitution | We will compile your software with never before seen, proprietary encryption libraries. Depending upon your performance requirements, we will base the encryption scheme on a combination of modified existing and new encryption tecnologies. This makes the effort of cracking the combined algorithm extremely expensive and theoertically impossible to decipher within the realm of reality. | Per project, with optional support contracts. | $1M NRC | enterprise, government, security, infrastructure, encryption, advanced security, proprietary |
BIOS firmware hardening/Long term hardware support | We will reverse engineer or obtain the original source code for a BIOS chipset, assess the firmware and modify it to support various security enhancements. | Per project | $175K | SMB, enterprise, government, military, security, infrastructure, advanced security |
Secure air gapped system consulting | We will design an air gapped computing infrastructure for your most critical security needs in extreme situations. We will make use of proven technologies including faraday cages, isolated atomic clocks, rotary generator electrical isolation, fiber optic based displays and optional proprietary intermediary query exchange microcontrollers. | Per project | From $50K NRC | enterprise, government, infrastructure, security, electrical engineering, computing, theory, advanced security, military, hardware |