Secure Layer 2 VPN Solutions
Resilient, post-quantum ready networking with military-grade encryption. Proven in US government operations, DISA-approved, and deployed in theater. Zero-trust architecture for critical infrastructure and mission-critical operations.
A Legacy of Innovation: Technology "Firsts"
Pioneering groundbreaking advancements in secure communications for decades
Iridium as Modem
First to Deliver Data Services Over Iridium for Consumer and Military Communications
We partnered with Iridium for the 'Apollo' solution, enabling direct internet access via Iridium phones as modems. This powered solutions in extreme environments, including a charity expedition retracing Scott's walk to the South Pole.
WLAN on Trains
First to Deliver Public Internet Access on Trains
In 1996, we teamed with Cellnet for mobile data on trains using bonding technology. By 2003, we deployed full WLAN on Virgin and GNER trains, bonding satellite, trackside WiMAX, and mobile bearers.
Mobile ANPR for UK Police
First to Deliver Mobile ANPR into UK Police
Before 1998, vehicle detection relied on outdated data loads. We transformed police cars into connected vehicles, linking cameras to national crime databases in real-time for agile, accurate threat detection.
SD-WAN
First to Architect and Deploy SD-WAN Solutions in 1993
Deployed commercially in 1992 for retailers like Marks & Spencer, and in 1994 to connect all UK fire stations. Used by Intel for WiMAX launch at CES and still powering UK critical infrastructure today.
Secured Data
First to Commercially Deliver Elliptic Curve Cryptography in 2005; Deploying PQC in 2026
RSA is outdated—our 512-bit Elliptic Curve encryption has secured UK utilities for over 20 years, including the Obama Inauguration. Now, we're rolling out Crystal Kyber Post-Quantum Cryptography for government and military clients.
Object Defined Networking (Deployed 2001)
First to Treat Network Resources and Rules as Defined Objects
Our object-oriented architecture abstracts devices, VNETs, firewalls, IDS, and more, aligning with MOSA principles for platform-agnostic, reusable deployments.
Proven Success: US Government Projects
Trusted in high-stakes US operations and military deployments
Military Surface Deployment and Distribution Command
Radio Frequency Identification In-Transit Visibility Operations
Provided the communications layer for RFID tracking of assets—from guns to tanks—during the early Iraq conflict, enabling real-time movement monitoring across ports, roads, and bases.
District of Columbia – Obama Inauguration 2009
Multi-Agency Communications Platform
Bonded T-Mobile, Sprint, WLAN, and pre-launch Intel WiMAX for secure agent access to critical intelligence. Pre-surveyed networks for coverage, congestion, and black spots.
DISA (Defense Information Systems Agency)
Reseller for Secure Connectivity
Deployed in Pearl Harbor's Secure Military Gateway for theater projects. Defense contractors download our software from DISA's site to embed secure connections into their platforms.
Core Architecture and Features
Basic Architecture
- Clients directed to optimal geo-located, least-loaded Secure Virtual Router (SVR) via load balancer
- SVRs terminate or switch encrypted Layer 2 tunnels
- Profile servers provision entire network including VNETs, devices, users/groups, firewalls, IPs, IDS, and security
- Dynamic ECMP routing minimizes jitter for smooth performance
Object-Oriented Networking
- Profiles link services, devices, VNETs, users, groups, and security rules
- Centralized management of IP, DHCP, and federated authentication
- MOSA-compliant design simplifies swapping dissimilar devices without reconfiguration
National Critical Infrastructure Qualification
Major UK gas utilities have standardized on our product for decades, with zero failures in 25 years. Approved by the NCSC (National Cyber Security Centre) for protecting national critical infrastructure—ideal for utilities, SCADA, CCTV, and more.
Advanced Applications: The Connected Soldier
Self-Healing Personal Area Networking (PAN) for battle-ready operations
- Layer 2 secure, app-agnostic networking with instant failover across bearers (fixed, satellite, mobile, wireless, Bluetooth, LoRa)
- Decentralized mesh for "man down" scenarios
- VNETs for isolated multi-tenant services: Drone Management, Situational Awareness
- Command & Control, Visual Augmentation, Biometrics integration
True Seamless Handoff
Maintain sessions across disparate networks at Layer 2 without interruption
Mission-Focused Secure Virtual Networking
Flexible routing and segmentation for multi-domain ops, on-prem or edge
Profile-Based Access Control
Granular policies for rapid reconfiguration in dynamic missions
End-to-End Encryption
Persistent security even in disrupted conditions, with post-quantum readiness
Rapid Reprovisioning
Quickly adapt networks for new threats or coalitions
Self-Healing PAN
Decentralized mesh for 'man down' scenarios with instant failover
Ready to Secure Your Operations?
As your exclusive US partner, we make deployment easy and affordable. Contact us today for a demo or custom quote.
