SmokeTunnel is the first fully secure IP network tunnel. This utilizes the company’s patented Streaming Transmission One-time-pad Protocol, better known as STOP, to prevent the interception and injection of data across the wire.
SmokeTunnel provides a true virtual private line between two endpoints in a network. To improve data security, it is moved in the network using multiple Moving Target Defense techniques. The next generation of security is finalized by encrypting the data being sent across the network using Streaming Key Encryption which provides a unique key for each byte of data. Not only does this provide stronger encryption for the data, it also has the best performance. Tests show SmokeTunnel can approach full bandwidth on a Gigabit Ethernet interface.*
SmokeTunnel is simple to use and works like any other network tunneling solution. The interface presents itself in the OS like any other TCP/IP network resource. Any application can connect to the tunnel for seamless integration with any network application that requires a secure connection to another networked resource.
With SmokeTunnel, the amount of Moving Target Defense used, how the system is initialized and other factors can all be configured. Implementation can be balanced against performance, ease of use and other requirements. In short, SmokeTunnel provides simplicity plus flexibility at the Operating System level. Ensure your data is truly secure going across the network with SmokeTunnel. Contact us to learn how SmokeTunnel can protect your information.
- Drop-in replacement for network tunneling needs
- Up to 16x faster than tunneling with OpenVPN/AES256.
- Simple and easy to use.
- Vastly improved security compared to existing IP network tunnels
- Technology is backed by granted USPTO patents: #8,995,652, #9,584,313, #9,584,488, #9,825,922 plus patents pending.
* In tests using commodity CPUs, SmokeTunnel reached speeds of over 800 mbps on GigE interfaces. On the same equipment, OpenVPN using AES256 encryption only provides roughly 50 mbps due primarily to encryption processing constraints.