XSOC CORP’s talented core of senior software and hardware engineers mesh decades of algorithmic programming experience with high-performance encryption techniques. Matching global-level innovations in cybersecurity with the business and marketing acumen of a highly seasoned executive management team have accelerated XSOC CORP’s rapid launch into the market.
After three years of intensive research and development, XSOC CORP has emerged from stealth mode and today announced the company’s new cybersecurity solutions aimed at providing enhanced cryptographic capabilities for existing devices in localized industrial and wireless environments. XSOC CORP delivers post-quantum ready data security built to protect enterprises’ most highly sensitive data and communications from well-financed hacking groups and nation-state attackers employing increasingly sophisticated attacks.
XSOC CORP expands upon the notion that strong encryption, combined with better tools, is the only real way to ensure protection of data and systems from external threats – no matter how sophisticated. XSOC CORP’s new technology addresses gaps in traditional cybersecurity systems by offering advanced encryption products, utilities, and pluggable components that are uniquely designed for the expanding Internet of Things (IoT) and Industrial Internet of Things (IIoT) markets.
“We have offered our core, flagship, and patent-pending cryptosystem technology directly onto a publicly available GitHub account for free use and evaluation by the broader academic community,” said Richard Blech, CEO, XSOC. “XSOC CORP is confident that the applied use of this extreme-performance symmetric encryption technology, also named ‘XSOC,’ will help to protect many from the continuously evolving threats that people face every day. Our cryptosystem is more than just a standalone cipher or an algorithm. It is a suite of tools and APIs designed to make cryptography useful and easily integrated into real-world applications.”
XSOC CORP is working with both the academic and professional community to help address some of the issues with outdated Public Key Infrastructure (PKI). SSL/TLS are generally the most used form of PKI, but offer only a “static” certificate-based solution that, in many cases, updates cryptographic key material certificates once per year. The certificate concept hasn’t changed or improved much in the last 20 years, rather it has simply become more expensive while remaining challenging to deploy and manage. Enter SOCKET, a unique new technology designed to enable continuous cryptographic key rotation (updates), with or without the support of SSL/TLS certificates.
SOCKET is a cryptographic key-exchange mechanism designed for near-field / radio frequency (RF) and wireless transmissions that support hardened encryption security closed-circuit, limited-distance, or intermittent ad-hoc network environments. Examples include securing drone-to-drone communications, tactical encrypted walkie-talkies, and other similar (battlefield) type environments that require rapid setup and tear-down.
SOCKET also provides an equally stable and secure mechanism of key infrastructure for more permanent network environments. For example, SOCKET can be used as a stand-alone (out-of-band) method of symmetric key transfer for legacy devices in an industrial (IT/OT) or commercial wireless security environment, or modern streaming video cameras in a warehouse or embassy. SOCKET is an ideal companion to the XSOC Cryptosystem which provides a secure solution for symmetric key exchange, enabling security in environments where TLS (SSL Certificates) are undesirable or infeasible. For the technically inclined, SOCKET may be thought of as an “N-Tier” version of Kerberos / X.509 technology, a 20-years advanced version of symmetric key transfer that does not have a single point of failure.
While XSOC CORP’s SOCKET technology focuses on the concept of secure key exchanges in private network environments, it has also opened the technology fully to internet by way of WAN-SOCKET. The Wide Area Network (WAN) version of SOCKET uses advanced Distributed Hash Table (DHT) and Peer to Peer (P2P) technology to securely deliver symmetric encryption keys anywhere and with minimal lag or latency.
The efficiency of SOCKET (and WAN-SOCKET) stems from the final pillar of XSOC CORP’s core underlying technology suite, known as Encrypted Broadcast Protocol or “EBP.” EBP is a native security protocol for network-efficient encrypted signal communications running at 512bit, or greater, encryption strength. XSOC CORP has innovated on top of the already efficient UDP protocol, making it 100 percent reliable, while also delivering data that is fully encrypted. In a direct head-to-head challenge against the TCP/IP protocol, XSOC CORP has demonstrated transmission of large amounts of data over EBP can be done more than twice as fast as the leading FTP client/server, while still being protected by 512bit encryption.
The News Highlights
- XSOC CORP has come up with Four Foundational Patent Pending Cryptographic Systems which are built to Secure Critical Data
- Check the latest update on Security news
For Latest News Follow us on Google News
- Show all
- Trending News
- Popular By week