Enterprise | Personal

Introducing the world‘s first counter-reconnaissance system

Every cyberattack starts somewhere

In the news


We recently launched our secure video service! Give it a look

In the news

The days of blocking and preventing attacks against a static perimeter are gone

Perimeter defenses do not work*. Heuristic, signature, and behavior based defenses react after a breach has occured.

When they finally discover the breach, your enterprise has already sacrificed operation time, reputation, revenue, and potentially exposed you and your client's data.


If you want to communicate securely in a simple, modern fashion, I would recommend you check out our new secure video service.


Choose your battlefield

Make your defenses dynamic and push the fight outside of your perimeter.

picture representing confidential communications (phone)

Confidential Communications

Don’t get hacked, tracked, or located. Conduct business in any environment under any strategic security condition. Collaborate across borders, gather remote sensor data, and send files between teams securely.

How we enable secure, anonymous communications.
picture representing malware secure device

Intercept malware before the endpoint

Our application blocks serve to intercept malware ahead of your institution’s perimeter. These blocks only re-render safe content onto your local device. Blocks that intercept malware and become infected are readily destroyed and replaced by fresh devices.

How our technology can protect you.
picture representing an isolated network device

Segment your networked devices

Data is transmitted out of your facility in isolated tunnels, meaning locally installed malware cannot spread. Communications between network devices utilize encrypted, air-gapped brokers, meaning an attacker cannot establish a continuous connection to exfil data.

Why network segmentation is important to reducing malware spread and threat vectors.
picture representing online anonymity (padlocked folder)

Security with obscurity

(Because we don’t wear red coats into battle anymore)

Dispel anonymizes your metadata on the internet. Protect your company’s reputation, protect your teams abroad, and make it harder for attackers trying to use your data to lay traps at vulnerable sites and services regularly visited by your employees.

How we make your internet connection anonymous and encrypted.

Secure, cynical, & paranoid by design

Dispel uses open-standard encryption protocols and independent auditing to keep your communications and infrastructure secure.

  • enhanced_encryption 2x AES‑256 Encrypted

    We use two layers of AES‑256 encryption with 2048-bit RSA for initial key exchange on all data in motion. Keys are single-use for each Dispel block and are discarded every time.

  • fingerprint Auditing and data destruction

    All of the data on a Dispel Non-Predictive Network is destroyed when the NPN is deactivated. For those who need it, Dispel can maintain independent logs to meet compliance and regulatory requirements.

  • gps_fixed Whitebox penetration tested

    Our APIs, engines, cloud providers, and web interfaces undergo regular independent whitebox penetration testing. Results are available upon request from clients.

  • verified_user Custody of control

    We maintain licensed relationships with multiple cloud providers so data always remains under contract and our clients‘ authority.

The next step is yours

Explore our platform.


See Dispel in action.

Request a demo

Have questions?


Request a demo

Fill out the form below or give us a call at +1 (718) 786-8795.

Thanks for getting in touch!

Excellent, we will be in touch within 24 hours.


I can’t help but call out (pun intended) to remind you to check out our newly launched secure video conferencing solution. We use it every single day.