Bill Alderson, CEO
Data security has been a top priority for governments, businesses, and economies around the globe. In the current scenario, however, the security landscape faces numerous challenges.
The conventional security measures focused on denying network access for unauthorized users have not been successful in stopping this ever-looming threat. Hackers have become more sophisticated and can breach even well-fortified networks easily to exfiltrate and destroy sensitive data.
As organizations continue to fall prey to cyber-attacks, more companies are now turning to reliable cybersecurity vendors that not only help in protecting sensitive data but also in detecting and killing phish entirely. HOPZERO asserts their network data containment system catches phish and ransom attacks before they can access your most valuable data.
Set against this backdrop, Austin-based HOPZERO has propelled its way into the cybersecurity market with smarter and more-responsive security solutions. The company offers its flagship product, HOPSphere Radius Security, which not only prevents data exfiltration but also identifies and destroys cyber-attacks. “Our forte lies in providing robust security at the TCP/IP network layer that leverages protocol rules to limit how far data packets can travel,” states Bill Alderson, CEO of HOPZERO.
HOPSphere Radius Security focuses on two aspects, visibility and data containment, for its customers. The HOPSphere’s visibility solution helps customers know what is leaking out of a company. And, using the data containment capability customers can set parameters on how far information can travel and contain that data while ensuring it does not leave.
Elaborating more on data containment, Alderson explains, “Data travel means how many routers data can travel through. There is a simple parameter that every computer has used since the beginning of TCP/ IP and the internet. Our objective is to align with the parameter and modify it according to how far the customer wants data to travel.” The company’s visibility solution learns where data is traveling.
Our forte lies in providing a robust security at the TCP/IP network layer that leverages protocol rules to limit how far data packets can travel while ensuring sensitive data is protected when all other security measures fail
The containment solution takes the intelligence that it has gathered about how far data is moving and then limit to an appropriate value.
He further reveals, “The appropriate value that we are talking about is called HOP count.” Typically, Hackers HOP through the Internet, through routers to steal information. Each time a packet goes through a
router, the value of the HOP count is decremented.
Typically, a very large HOP count is set by default, in every computer, regardless of the operating system. This HOP value is placed in every packet before it leaves a computer and is set at a very high value, then decremented until it reaches zero. “Unlike the conventional security approach, we lower the number of HOP counts,” states Alderson. By lowering the HOP count number, the packet is destroyed when the HOP goes to zero. This stops data from traveling beyond the data center or the organization’s network to the Internet where control is lost.
For instance, if a user is communicating with a server in Iran, the packet goes through the Internet, and it decrements by one after every router it goes through. During this time, HOPSphere Radius learns how many HOPS are necessary to reach a vital database server. Then the system determines how many routers there are in the data center and sets that server to the same HOP count. When the HOPreaches zero, every router in the world ever manufactured since time and eternity, unilaterally destroys the packet.
At the same time, when the packet is destroyed, that router sends out an alert message back to the center about what has transpired. There are two advantages to this approach; first, data cannot travel beyond the data center. Second, if someone is trying to break into an organization’s most valuable server in the data center, they can contain the data and alert the IT security team.
For the road ahead, HOPZERO is working on a ‘proof of concept’ to build a new system for the U.S government and law enforcement customers. Apart from this, the company is planning to move its capabilities from the premise to virtual environments such as the cloud.