VDES:SDN, PQC-KEM   

Virtual Dissimulated Encrypted Server (VDES), Obfuscator and Redirector Server with PQC-KEM (ML-KEM, FIPS 203)

​Crafted for ultimate concealment, the VDES: SDN, PQC-KEM pl​atform is designed to obfuscate the actual endpoint IP of the landing server. The VDES: SDN, PQC-KEM assumes the role of a traffic redirector by accepting connections from end-user devices, generating an encrypted tunnel FIPS 203 ML-KEM over a private IP, and redirecting the traffic through the encrypted tunnel t​o the destination non-routable IP server.

The VDES: SDN, PQC-KEM infrastructure is designed and configured based on the highest security standards, incorporating multiple layers of protection and Intrusion Detection System (IDS). Unlike any other providers, once the VDES: SDN, PQC-KEM server is configured, the customer has direct access to the server’s jail partition log directory, with full access to the historical and live logs and records, via a unique SSH key for complete oversight and compliance.


Traffic Obfuscation

  • VDES: SDN, PQC-KEM serves as a traffic redirector, concealing the real endpoint IP address of landing servers.
  • Operates web servers on proprietary ports, blending seamlessly with cyberspace noise.
  • Reveals only two open ports during external cyber scans for enhanced security.

Post-Quantum VPN Technology

  • Features a proprietary VPN server with ML-KEM, NIST Security Level 5 technology.
  • Generates a single PQC certificate with no DNS resolution for added security.
  • Exported certificate is hard-coded onto destination servers, ensuring protection and obfuscation.

Decoy Obfuscation Tool (DOT)

  • Creates a symbolic link for the PQC certificate connection, rendering destination servers non-routable.
  • Conceals the IP address of destination servers from the outside cyber world.

Multi-Layered Security Configuration

  • VDES: SDN, PQC-KEM is configured with multiple security layers, enhancing overall protection.
  • Spots no proprietary digital signatures, further contributing to its stealth in cyberspace.
Person holding smartphone with trading app in front of laptop displaying financial charts

User Experience


  • Initiating a request from a device to a destination server involves the VDES: SDN, PQC-KEM server.
  • VDES: SDN, PQC-KEM generates a PQC tunnel to the destination server, redirecting the request securely.
  • The destination server responds through the same tunnel, ensuring a seamless and protected user experience.



3D digital network of interconnected cubes representing secure server infrastructure and data routing

Applications


Ideal for securing:

  •  blockchain servers
  • web servers
  • VOIP servers
  • Citrix servers 
  • database servers

Suitable for environments where IP obfuscation and protection against advanced cyber threats are paramount.


Benefits

Maximum Security

VDES: SDN, PQC-KEM offers robust security layers, Post-Quantum encryption, and decoy obfuscation, ensuring your digital assets remain safeguarded from advanced cyber threats.


Stealth Operation

The solution operates discreetly, concealing proprietary digital signatures and reducing the attack surface visible to potential threats.



User-Friendly Integration

With a user-centric approach, VDES: SDN, PQC-KEM seamlessly integrates into your existing infrastructure, providing a secure and transparent experience for end-users.


Protect your data, secure your future.