The Silicon Review
“With 14 years of R&D behind us, we will continue to deliver solutions that meet and surpass the ability to secure communications and storage.”
Today, as organizations continue to evolve their data security protocols, cyber criminals are also advancing the sophistication of their hacking techniques. In the wake of these developments, even the smallest data breach into an organisation’s operation technology (OT) network can cost the organization to incur enormous losses, making it very risky to leave networks exposed to such cyber threats. Thus, the urgency to make the OT environment impenetrable is real. To help solve these concerns, Florida-based NCoded Communications, Inc. (NCoded) was established. Since its inception, the company has been able to prove its competence in fortifying data security through and through with the help of its unique Zero Trust Environment (ZTE) security model.
At the core of NCoded Communications’ ZTE overlay is a simple objective: “Trust must be earned – not implied or granted, absolute, always-on, and dynamically-created without human intervention.” To make this possible, NCoded employs several proprietary and unconventional security measures to secure sensitive data from unwanted access while also protecting the data-in-transit across any platform and device. “We utilize a Zero Trust Environment in our clients’ OT ecosystems to ensure their critical information in all the devices are completely shielded from external attacks at all times,” says Peter Rung, CEO and Chairman of the Board at NCoded Communications.
In the pursuit to deliver impenetrable security, NCoded offers its clients a two-pronged approach to security. Firstly, the company ensures advanced security by implementing its ZTE overlay environment in every OT platform/device to reduce attack surfaces within a client’s network. For this, the company uniquely encrypts data-in-transit by deploying in it’s logical endpoints two FIPS 140-2 certifications and establishes a software-defined network (SDN) to lower a client network’s visibility on the internet. Secondly, NCoded secures user access by leveraging advanced security measures like biometrics and industry-leading intrusion protection capabilities. “We work with our clients to move their transactional servers and other sensitive data to non-routable IP addresses that can only be accessed through our software-defined perimeter access points,” explains Rung.
These innovative functionalities are best highlighted in NCoded’s product portfolio, UltraSuite, which includes three products—UltraPAD, UltraCOM, and UltraREEL. UltraPAD is a digitized One-time Pad, using one-time encryption keys, executing several layers of encryption similar to the NSA’s Multi-Site Connectivity Capability Package for secret level communications http://bit.ly/2MFdp20. These are used by NCoded trusted nodes, clients and servers on client devices such as PCs, smartphones, and tablets and at the perimeter of a client’s SDN respectively. This is followed by a collaborative effort where NCoded works with the client to move its sensitive data to servers with non-routable IP addresses. Lastly, the company helps the client set up global user access points into the secure IPs for its internal team and external customers. “As a result, the UltraPAD node only allows other UltraPAD nodes to communicate with a client network and blacklists users that are not part of the advance UltraPAD ecosystem,” states Rung. In addition, UltraCOM is used for safeguarding internal voice, video, and text-based communications, and UltraREEL is deployed as a secured streaming solution. This allows secure streaming of multimedia eliminating successful piracy in the industry.
Apart from its efficacy in securing OT infrastructure for government agencies and private enterprises alike, the company’s Zero Trust Environment can also be leveraged to help develop a robust cybersecurity posture for smart cities. “Without a highly-advanced cybersecurity framework, from a cybersecurity perspective, smart cities are just an enormous collection of digital endpoints waiting to be exploited by hackers. Given the smart cities data, this is not acceptable moving forward!” explains Rung. Furthermore, he believes that the increased susceptibility to data breaches is caused because of legacy IT security standards that make it easy for cybercriminals to find newer ways to breach a data network. NCoded’s Zero Trust Environment overcomes this challenge by offering equivocal protection for all networks, regardless of whether the standards are legacy and cloud.
With such encryption, access and authentication capabilities, NCoded is perfectly poised to tackle all present and future challenges concerning the safekeeping of text and data communications. According to Rung, a Zero Trust Environment is the only path forward to protect a digital infrastructure. Driven by this vision, NCoded is focused on upgrading its cybersecurity portfolio to deploy the Zero Trust Environment protecting cybersecurity problem areas (in random order) such as: (1) Ransomware injection into servers; (2) Protecting the electrical grid; (3) Securing the integrity of the 2020 vote; (4) Securing media streaming; (5) Protecting against quantum computing attacks; and (6) securing the deployment of 5G towers; among others. On the same lines, the company is also emphasizing the development of newer and more effective solutions for secured data storage. “With 14 years of R&D behind us, we will continue to deliver solutions that meet and surpass the ability to secure communications and storage,” concludes Rung.