We make hardware that provides the strongest drop-in security for your existing critical infrastructure.
We go beyond US Top-Secret standards to provide an impenetrable silicon barrier to bad actors and malicious threat vectors.
QNS uses post-quantum cryptography and a hardware-based true random number generator.
Q-Net Security works seamlessly with any network. Simply plug in a Q-Box to secure an end-point, register it, and go.
Management is a snap through our robust Policy Manager (QPM). Remember, silicon requires no software updates!
Superior Security for Point-to-Point Communication
Q-Net Security is purpose-built to create an impenetrable barrier between defined endpoints within your existing network. QNS is national intelligence-grade, quantum-resistant security that is more powerful than any other cybersecurity solution in the world.
Highlights & Benefits
Designed, constructed, and assembled in the USA
QNS changes keys after every packet or transaction, further reducing the risk of exposure beyond that required for national security. The entropy needed for this many keys comes from separate True Random Number Generators (TRNG) located inside the Q-Box at each endpoint.
Existing networked computers with point-to-point communications can be QNS enabled simply by inserting a QNS device (Q-Box) between each endpoint and the network. The Q-Box operates independently of the endpoint and thus has no impact on existing configuration or performance.
QNS utilizes the US Top-Secret standard, AES-256-GCM-256 encryption, utilizing symmetric keys for which decryption is computationally intractable.
QNS hardware barrier security completely isolates the protected node (computer) from the unprotected and untrusted network. This barrier not only provides encryption, but also authentication and detection of violations of packet integrity. The barrier is completely independent of the protected node, cannot be compromised and utilizes no resources in any protected node.
The links between endpoints may be separated by long physical distances over public/private networks.
QNS technology ensures that all packets forwarded to a QNS endpoint are generated by an authorized source and have not been covertly or accidentally altered. QNS uses Galois Counter Mode (GCM) technology to achieve non-repudiation and message authentication.
With QNS, regulatory compliance is a snap. Organizations facing Sarbanes-Oxley, HIPAA, GDPR-EU, and other governmental regulations need to demonstrate active implementation of industry best practices that comply with these rules to avoid breaches and potentially substantial fines. QNS goes beyond industry best practice and raises the bar for compliance with confidentiality of sensitive information. For those criminals who try to gain inappropriate access to these precious data, the bar becomes unreachable.