Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/1/2019
01:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Security Approach Prevents Data Theft By Imposing Limits on Data Travel, Preventing Unauthorized Access to High Value Servers

HopSphere Radius Security Applies Standard Routing Principles to "Put Data on a Leash," restricting critical data from going to dangerous or untrusted destinations

AUSTIN, TX – March 28, 2019 – HOPZERO Corporation, pioneers of intelligent data containment based on routing distance, today announced the availability of its unique flagship product, HopSphere Radius Security.  Available immediately, the new product addresses the seemingly unstoppable data breach pandemic, addressing challenges of insider abuse and compliance requirements. HopSphere Radius Security imposes absolute travel limits for data packets based on security policy and machine learning of what distance is normal, allowable and safe.

Designed specifically for use by data owners and InfoSec managers, HopSphere Radius Security represents an agentless endpoint security solution that proactively identifies data compromises and prevents undetected exfiltration. Unlike firewalls that don’t detect or stop data exfiltration and are prone to configuration error, HOPZERO proactively constrains information from traveling outside an organization’s network by leveraging existing security and network infrastructure. 

Reversing the direction of IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems), HOPZERO stops data from leaving an organization opposed to data entering an organization.   HopSphere Radius Security introduces EDS/EPS (Exfiltration Detection/Prevention) technology that compliments IDS/IPS providing a powerful enterprise exfiltration security solution.

“The data breach crisis grows increasingly worse, and traditional means of security have proven largely ineffective at stopping a determined cybercriminal, activist or rogue insider,” said HOPZERO founder and CEO, Bill Alderson.  “HOPZERO utilizes immutable networking principles to effectively put high value data on a leash and govern how far it can go. Unlike anything available today, this method represents a whole new way of implementing security to safeguard valuable assets.”

HopSphere Radius Security utilizes a unique approach to network security by setting data lifespan “hop” routing limiting how far servers can reach or be reached. In networking, hop distance refers to the total number of routers, from source to destination—that a packet passes through. HopSphere Radius Security is designed to protect mission critical systems.

These critical systems, such as high value databases, are limited to communicate with only previously determined neighbors.  By monitoring normal traffic, HopSphere Radius Security builds custom neighborhoods keeping unauthorized users—even those within the company—out of protected servers. The product effectively cloaks the server, making it invisible and unapproachable to the would-be attacker, while sending an alarm to the security team detailing where the unsuccessful attack is coming from. The alarm captures the IP address of the attempting station identifying the attacker and storing evidence of the attempt for remediation and potential legal action.

This method of reducing data travel distance results in fewer reachable devices, proven mathematically, to shrink the potential attack surface. Accessibility to fewer global network devices means fewer hackers can reach, or be reached, by a target computer or server, improving security. Access to designated servers may be limited to a hop count or radius that only enables internal access or connections to a smaller “sphere of trust”—a fundamentally new approach to security. HopSphere Radius Security makes it impossible to access systems directly from outside the sphere of trust created by the lower packet lifetime.

"The HOPZERO product offers great value to organizations who are concerned about data loss", said Kerry Kelley, former CIO of US Strategic Command. Now a private consultant working in the security industry, Kelley says,  "With HOPZERO, the attack surface can be deterministically reduced, and data fully protected using the novel approach of router hop count in a game-changing way of turning the tables on would-be attackers."

HopSphere Radius Security helps organizations assess risk and meet compliance requirements. With it, organizations can comply with privacy and data storage laws and regulations. For cloud environments, HopSphere Radius Security could be used to show where a cloud hosting company, CDN or other partner or provider is sending or storing an organization’s data. Particularly useful is HOPZERO’s one click GDPR filter which maps where any GDPR data is collected by an organization’s servers. One GDPR compliance company, https://icomply365.com/ uses HOPZERO’s solution to vet which servers are collecting information subject to GDPR.

HopSphere Radius Security is a cloud-based solution that complements existing security and networking hardware without requiring changes to individual components. The system is easily implemented by the HOPZERO support team without the use of endpoint software agents. In an emergency breach situation, HOPZERO can have their system up and running in less than one hour to quickly identify potential hackers.

About HOPZERO

HOPZERO is the pioneer of a revolutionary SaaS solution that secures information by controlling the distance it can travel. HOPZERO “puts data on a leash,” long enough to do business yet short enough to prevent compromise. HOPZERO is headquartered in Austin, Texas.   See in 90 seconds how HOPZERO Thwarts Phishing at hopzero.com/videosor review a ground-breaking assertion of mathematical proof that reduction in attack surface improves security risk at hopzero.com/whitepaper.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
Stephen Ward, VP, ThreatConnect,  7/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15600
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
CVE-2020-15599
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
CVE-2020-8916
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
CVE-2020-12821
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.
CVE-2020-15008
PUBLISHED: 2020-07-07
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user su...