The world of IT and security is changing every minute, with evolving technology, new security threats and emerging industry requirements. We not only keep up to date with news and information about the latest developments in network security and computer communications, but we ensure that our customers are provided with educational tools and resources to keep them up to date.
We offer the following pages as resources for our customers and other interested parties to investigate the latest developments in network security and computer communications:
Each threat actor has their own drivers and capabilities which include more advanced techniques/resources focusing on differing targets. Threat actors generally fall into one of the following categories where each represents a much higher threat/risk potential and therefore a higher Department of Homeland Security (DHS) threat level. Current information security techniques typically only cover threats representing a major flaw. Prudent risk threat analysis should consider industries threat characteristics and geographic potential to determine the relevancy of each DHS Threat Level.
- Limited funding
- Opportunistic behavior
- Target known
- Use viruses, words, rudimentary Trojans, bots
- Acting for thrills, bragging rights
- Easily detected
- Very sophisticated tradecraft
- Foreign intelligence agencies
- Very well financed
- Target technology as well as information
- User wide range of tradecraft
- Establish covert presence on sensitive networks
- Difficult to detect
- Supply interdiction / hardware implants
Frequently Asked Questions
+ Is ANS FabriX™ compatible with current legacy network applications?
+ Is ANS FabriX Open Source?
+ What are the system requirements for ANS FabriX?
+ Does ANS FabriX work on Software Defined Networks (SDN)?
+ Is ANS FabriX a patented technology?
+ Is ANS FabriX based upon industry standards?
+ What Open System Interconnection (OSI) layers does ANS FabriX support?
+ How does ANS FabriX create ANS Security Zones™?
Provides easily deployed and maintained polymorphic security zones that dynamically morph the zone’s shape and coverage as needed to meet any operational condition.
Nano Segmentation – connecting two Nodes (devices) to establish direct private communications (e.g. NBI or SBI → 1-to-1).
Micro Segmentation – to connect a number of Nodes for specific communication requirements (e.g. SDLAN or SDDC → 1-to-many).
Macro Segmentation – establishes specific communications across a large number of domain or topology agnostic Nodes (e.g. IoT or SDWAN → many-to-many).