Actively protecting our democracy with a system utilizing our Enclave platform.
Our elections are under attack.
Democracies depend upon the factual integrity of, and societal confidence in, elections. While technically trivial to hack most voting machines in person, it is far simpler, logistically, to erode confidence in an election by attacking the points of the process that depend upon the Internet — voter rolls, results aggregation, and political campaigns.
Proudly powered by Enclave
We’ve developed three systems to protect our elections from outside forces.
Our business is protecting data and the transfer thereof from nation state quality adversaries. All of our engineers and investors are American citizens, and we didn’t like it when people messed with our elections in 2016. The result was the development of three systems; each uniquely designed to protect a vulnerable stage of our electoral process in the United States.
Companies use Enclaves to cloak their networks and the applications living inside of them. Enclave provides simple tools for highly secure deployments attackers can‘t find.
Our Moving Target Defense stops attacks well ahead of older technologies.
Our Enclave Platform
Enclaves cover the complete lifecycle for deploying and protecting new apps, wrapping legacy infrastructure, and securing IoT/OT systems.
Select your Enclave location and begin building in minutes through the Dispel console. Our software clients and hardware integrations automatically update traffic routing, handle encryption, and health monitoring.
Isolated cloaked networks
Place systems behind the cloaking network to make them invisible. Or, boot resources inside for added resiliency.
Control and geography
Choose between multiple cloud providers and geographies. Enclaves are dedicated and single-tenant.
All of Dispel’s networks are self-contained, single-tenant, and 100% auditable.
Segment in any environment
Automatically generate software-defined and hardware-defined networks within your perimeter, out in the field, and within Dispel itself.
While the system cycles infrastructure during its lifetime, destroying the Enclave at conclusion eliminates there being a machine to hack, keeps costs down, removes usable intelligence for attackers, and aids in regulatory compliance. Archive data and history for retention.
Insider threat and blast radius
Starting Enclaves fresh every time prevents permission creep and removes forgotten authorizations that can be exploited in a phishing attack.
Free up your budget
Turn systems off you‘re not using. Dispel virtual machine management translates to reduced cloud costs, and better spending for your team.
A fresh start
The Destroy-Build cycle supports auto-updating, malware scrubbing, and cloud failover through a simple interface.