Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/1/2019
01:12 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Security Approach Prevents Data Theft By Imposing Limits on Data Travel, Preventing Unauthorized Access to High Value Servers

HopSphere Radius Security Applies Standard Routing Principles to "Put Data on a Leash," restricting critical data from going to dangerous or untrusted destinations

AUSTIN, TX – March 28, 2019 – HOPZERO Corporation, pioneers of intelligent data containment based on routing distance, today announced the availability of its unique flagship product, HopSphere Radius Security.  Available immediately, the new product addresses the seemingly unstoppable data breach pandemic, addressing challenges of insider abuse and compliance requirements. HopSphere Radius Security imposes absolute travel limits for data packets based on security policy and machine learning of what distance is normal, allowable and safe.

Designed specifically for use by data owners and InfoSec managers, HopSphere Radius Security represents an agentless endpoint security solution that proactively identifies data compromises and prevents undetected exfiltration. Unlike firewalls that don’t detect or stop data exfiltration and are prone to configuration error, HOPZERO proactively constrains information from traveling outside an organization’s network by leveraging existing security and network infrastructure. 

Reversing the direction of IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems), HOPZERO stops data from leaving an organization opposed to data entering an organization.   HopSphere Radius Security introduces EDS/EPS (Exfiltration Detection/Prevention) technology that compliments IDS/IPS providing a powerful enterprise exfiltration security solution.

“The data breach crisis grows increasingly worse, and traditional means of security have proven largely ineffective at stopping a determined cybercriminal, activist or rogue insider,” said HOPZERO founder and CEO, Bill Alderson.  “HOPZERO utilizes immutable networking principles to effectively put high value data on a leash and govern how far it can go. Unlike anything available today, this method represents a whole new way of implementing security to safeguard valuable assets.”

HopSphere Radius Security utilizes a unique approach to network security by setting data lifespan “hop” routing limiting how far servers can reach or be reached. In networking, hop distance refers to the total number of routers, from source to destination—that a packet passes through. HopSphere Radius Security is designed to protect mission critical systems.

These critical systems, such as high value databases, are limited to communicate with only previously determined neighbors.  By monitoring normal traffic, HopSphere Radius Security builds custom neighborhoods keeping unauthorized users—even those within the company—out of protected servers. The product effectively cloaks the server, making it invisible and unapproachable to the would-be attacker, while sending an alarm to the security team detailing where the unsuccessful attack is coming from. The alarm captures the IP address of the attempting station identifying the attacker and storing evidence of the attempt for remediation and potential legal action.

This method of reducing data travel distance results in fewer reachable devices, proven mathematically, to shrink the potential attack surface. Accessibility to fewer global network devices means fewer hackers can reach, or be reached, by a target computer or server, improving security. Access to designated servers may be limited to a hop count or radius that only enables internal access or connections to a smaller “sphere of trust”—a fundamentally new approach to security. HopSphere Radius Security makes it impossible to access systems directly from outside the sphere of trust created by the lower packet lifetime.

"The HOPZERO product offers great value to organizations who are concerned about data loss", said Kerry Kelley, former CIO of US Strategic Command. Now a private consultant working in the security industry, Kelley says,  "With HOPZERO, the attack surface can be deterministically reduced, and data fully protected using the novel approach of router hop count in a game-changing way of turning the tables on would-be attackers."

HopSphere Radius Security helps organizations assess risk and meet compliance requirements. With it, organizations can comply with privacy and data storage laws and regulations. For cloud environments, HopSphere Radius Security could be used to show where a cloud hosting company, CDN or other partner or provider is sending or storing an organization’s data. Particularly useful is HOPZERO’s one click GDPR filter which maps where any GDPR data is collected by an organization’s servers. One GDPR compliance company, https://icomply365.com/ uses HOPZERO’s solution to vet which servers are collecting information subject to GDPR.

HopSphere Radius Security is a cloud-based solution that complements existing security and networking hardware without requiring changes to individual components. The system is easily implemented by the HOPZERO support team without the use of endpoint software agents. In an emergency breach situation, HOPZERO can have their system up and running in less than one hour to quickly identify potential hackers.

About HOPZERO

HOPZERO is the pioneer of a revolutionary SaaS solution that secures information by controlling the distance it can travel. HOPZERO “puts data on a leash,” long enough to do business yet short enough to prevent compromise. HOPZERO is headquartered in Austin, Texas.   See in 90 seconds how HOPZERO Thwarts Phishing at hopzero.com/videosor review a ground-breaking assertion of mathematical proof that reduction in attack surface improves security risk at hopzero.com/whitepaper.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...