Xiid SealedTunnel™ Seamlessly Secures Enterprise Web Apps and Improves User Experience

Xiid SealedTunnel Wraps Web Apps Without the Risks of VPNs

Traditionally, accessing internal web applications requires the use of clunky, insecure VPNs. The overuse of VPNs is a significant security issue for most corporate networks, increasing the potential blast radius of breaches and creating an often-cumbersome process for users that encourages them to avoid using secure access methods.

Further, VPN concentrators and similar devices from vendors often suffer from zero-day attacks, granting attackers a single point from which they can exfiltrate unlimited amounts of sensitive corporate data.

SealedTunnel provides outbound-only, quantum-secure, triple-encrypted tunnels between users and single resources that reduce or eliminate the risk of lateral movement by attackers and can make resource access outside of the SealedTunnel impossible.

Reduce User Interaction Required for Secure Access

Let’s say that an organization has an internal resource available at sensitiveresource.acme.co that is currently accessed by logging into VPN software, typing an additional password, and waiting for the VPN to activate. With SealedTunnel, easily deployed on user machines via Group Policy (or similar mechanism), users no longer need to use their VPNs to access the resource and will enjoy a far higher level of in-transit data and access security. All system administrators must do is add a single DNS A record mapping to a loopback address IP:

and users simply can navigate to that resource in any browser they wish, with zero user interaction required on behalf of SealedTunnel. Further, other applications on a user’s machine that use the resource, such as database management software or voice/ video chat applications, will now be secured and continue to function normally without any required changes to local configurations. Access is secured universally, meaning that users could be using a public WiFi network in a hostile nation and simply use their resource as if they were on a trusted connection, knowing their connections remain secure. Since all SealedTunnel connections operate outbound-only, all open inbound ports on the resource can be closed, dramatically shrinking its attack surface.

Previous
Previous

Tactical Communications over Unstable Networks for UAVs, Sensors, and IoT Devices