+1.404.996.5742

The world of IT and security is changing every minute, with evolving technology, new security threats and emerging industry requirements. We not only keep up to date with news and information about the latest developments in network security and computer communications, but we ensure that our customers are provided with educational tools and resources to keep them up to date.

We offer the following pages as resources for our customers and other interested parties to investigate the latest developments in network security and computer communications:

Threat Categories

Each threat actor has their own drivers and capabilities which include more advanced techniques/resources focusing on differing targets. Threat actors generally fall into one of the following categories where each represents a much higher threat/risk potential and therefore a higher Department of Homeland Security (DHS) threat level. Current information security techniques typically only cover threats representing a major flaw. Prudent risk threat analysis should consider industries threat characteristics and geographic potential to determine the relevancy of each DHS Threat Level.

Garden Variety

  • Inexperienced
  • Limited funding
  • Opportunistic behavior
  • Target known
  • Use viruses, words, rudimentary Trojans, bots
  • Acting for thrills, bragging rights
  • Easily detected

Nation-State

  • Very sophisticated tradecraft
  • Foreign intelligence agencies
  • Very well financed
  • Target technology as well as information
  • User wide range of tradecraft
  • Establish covert presence on sensitive networks
  • Difficult to detect
  • Supply interdiction / hardware implants

Mercenary

  • Higher-order skills
  • Well financed
  • Targeted activity
  • Target known vulnerabilities
  • Use viruses, worms, Trojans and bots as means to introduce sophisticated tools
  • Target and exploit valuable data
  • Detectable but hard to attribute

 DHS Threat Levels

Frequently Asked Questions

+ Is ANS FabriX™ compatible with current legacy network applications?
Yes, ANS FabriX can work with all existing network topologies.
+ Is ANS FabriX Open Source?
No, ANS FabriX is built on open source concepts but includes patented technologies.
+ What are the system requirements for ANS FabriX?
ANS FabriX was designed from the ground up for resource constrained systems and requires less than 2 megabytes of memory.
+ Does ANS FabriX work on Software Defined Networks (SDN)?
Yes, ANS FabriX is the only solution currently on the market that truly secures a SDN Controller Plane at the lowest TCP/IP layers.
+ Is ANS FabriX a patented technology?
Yes, but ANS FabriX is a combination of technologies protected by patents.  Refer to our Patent Information page for further details.
+ Is ANS FabriX based upon industry standards?
Yes, ANS FabriX is built upon RFC standards to correct the flaws in the existing legacy protocols.
+ What Open System Interconnection (OSI) layers does ANS FabriX support?
ANS FabriX operates at OSI layers 2,3, & 4 and uses a real-time encapsulated User Datagram Protocol (UDP)
+ How does ANS FabriX create ANS Security Zones™?
ANS Security Zones – (dynamically adaptive) polymorphic network segmentation which supports current and future topology or architectures:

Provides easily deployed and maintained polymorphic security zones that dynamically morph the zone’s shape and coverage as needed to meet any operational condition.

Nano Segmentation – connecting two Nodes (devices) to establish direct private communications (e.g. NBI or SBI → 1-to-1).

Micro Segmentation – to connect a number of Nodes for specific communication requirements (e.g. SDLAN or SDDC → 1-to-many).

Macro Segmentation – establishes specific communications across a large number of domain or topology agnostic Nodes (e.g. IoT or SDWAN → many-to-many).