Post-Quantum Ready

Secure Layer 2 VPN Solutions

Resilient, post-quantum ready networking with military-grade encryption. Proven in US government operations, DISA-approved, and deployed in theater. Zero-trust architecture for critical infrastructure and mission-critical operations.

Deployed in Theatre
NATO Interoperable
Zero-Trust by Design
25 Years Zero Failures

A Legacy of Innovation: Technology "Firsts"

Pioneering groundbreaking advancements in secure communications for decades

Iridium as Modem

First to Deliver Data Services Over Iridium for Consumer and Military Communications

We partnered with Iridium for the 'Apollo' solution, enabling direct internet access via Iridium phones as modems. This powered solutions in extreme environments, including a charity expedition retracing Scott's walk to the South Pole.

WLAN on Trains

First to Deliver Public Internet Access on Trains

In 1996, we teamed with Cellnet for mobile data on trains using bonding technology. By 2003, we deployed full WLAN on Virgin and GNER trains, bonding satellite, trackside WiMAX, and mobile bearers.

Mobile ANPR for UK Police

First to Deliver Mobile ANPR into UK Police

Before 1998, vehicle detection relied on outdated data loads. We transformed police cars into connected vehicles, linking cameras to national crime databases in real-time for agile, accurate threat detection.

SD-WAN

First to Architect and Deploy SD-WAN Solutions in 1993

Deployed commercially in 1992 for retailers like Marks & Spencer, and in 1994 to connect all UK fire stations. Used by Intel for WiMAX launch at CES and still powering UK critical infrastructure today.

Secured Data

First to Commercially Deliver Elliptic Curve Cryptography in 2005; Deploying PQC in 2026

RSA is outdated—our 512-bit Elliptic Curve encryption has secured UK utilities for over 20 years, including the Obama Inauguration. Now, we're rolling out Crystal Kyber Post-Quantum Cryptography for government and military clients.

Object Defined Networking (Deployed 2001)

First to Treat Network Resources and Rules as Defined Objects

Our object-oriented architecture abstracts devices, VNETs, firewalls, IDS, and more, aligning with MOSA principles for platform-agnostic, reusable deployments.

Proven Success: US Government Projects

Trusted in high-stakes US operations and military deployments

Military Surface Deployment and Distribution Command

Radio Frequency Identification In-Transit Visibility Operations

Provided the communications layer for RFID tracking of assets—from guns to tanks—during the early Iraq conflict, enabling real-time movement monitoring across ports, roads, and bases.

District of Columbia – Obama Inauguration 2009

Multi-Agency Communications Platform

Bonded T-Mobile, Sprint, WLAN, and pre-launch Intel WiMAX for secure agent access to critical intelligence. Pre-surveyed networks for coverage, congestion, and black spots.

DISA (Defense Information Systems Agency)

Reseller for Secure Connectivity

Deployed in Pearl Harbor's Secure Military Gateway for theater projects. Defense contractors download our software from DISA's site to embed secure connections into their platforms.

Core Architecture and Features

Basic Architecture

  • Clients directed to optimal geo-located, least-loaded Secure Virtual Router (SVR) via load balancer
  • SVRs terminate or switch encrypted Layer 2 tunnels
  • Profile servers provision entire network including VNETs, devices, users/groups, firewalls, IPs, IDS, and security
  • Dynamic ECMP routing minimizes jitter for smooth performance

Object-Oriented Networking

  • Profiles link services, devices, VNETs, users, groups, and security rules
  • Centralized management of IP, DHCP, and federated authentication
  • MOSA-compliant design simplifies swapping dissimilar devices without reconfiguration

National Critical Infrastructure Qualification

Major UK gas utilities have standardized on our product for decades, with zero failures in 25 years. Approved by the NCSC (National Cyber Security Centre) for protecting national critical infrastructure—ideal for utilities, SCADA, CCTV, and more.

25 Years • Zero Failures • NCSC Approved

Advanced Applications: The Connected Soldier

Self-Healing Personal Area Networking (PAN) for battle-ready operations

  • Layer 2 secure, app-agnostic networking with instant failover across bearers (fixed, satellite, mobile, wireless, Bluetooth, LoRa)
  • Decentralized mesh for "man down" scenarios
  • VNETs for isolated multi-tenant services: Drone Management, Situational Awareness
  • Command & Control, Visual Augmentation, Biometrics integration

True Seamless Handoff

Maintain sessions across disparate networks at Layer 2 without interruption

Mission-Focused Secure Virtual Networking

Flexible routing and segmentation for multi-domain ops, on-prem or edge

Profile-Based Access Control

Granular policies for rapid reconfiguration in dynamic missions

End-to-End Encryption

Persistent security even in disrupted conditions, with post-quantum readiness

Rapid Reprovisioning

Quickly adapt networks for new threats or coalitions

Self-Healing PAN

Decentralized mesh for 'man down' scenarios with instant failover

Ready to Secure Your Operations?

As your exclusive US partner, we make deployment easy and affordable. Contact us today for a demo or custom quote.