Fognigma Logo

Date: 09/24/2024

Vendor: Fognigma

Technology/Topic: Scalable, Invisible, Automated Zero Trust Collaborative Cloud Networks

URL: https://fognigma.com

TEM Video Recording (milTube)

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

FOGNIGMA is a TRL 9, Commercial-Off-The-Shelf (COTS) software product that automates the rapid deployment of private, invisible, encrypted networks to provide secure communication and collaboration (voice, video, messaging, and data); disposable, sandboxed virtual desktop infrastructure (VDIs); anonymous open-source research; anonymous/misattributed telephony; managed attribution and moving target defense; and more.

Networks and resources are deployed through up to 10 different commercial cloud providers, spanning over 150 data centers in more than 30 countries across 6 continents. Fognigma can be hosted privately, in the cloud, or in a hybrid deployment, and can integrate with existing infrastructure and legacy systems without requiring an immediate shift in usage. It can also provide complete, standalone environments for operation, enhancing interoperability between U.S. and partner military and intelligence organizations, infrastructure, and systems.

Fognigma leverages a variety of security features to maintain anonymity and avoid discovery or association between networks elements, users, and organizations. When Fognigma communicates with commercial IaaS cloud providers to deploy virtual machines, it does so using a pool of disposable micro instances hosted by commercial PaaS providers (10+ supported) that act as intermediaries. This ensures the central Fognigma server never communicates directly with any source and obfuscates activity in vast amounts of commercial traffic. When a micro instance is used, it is automatically destroyed and replaced by another. This same system is used for the central server’s connections to virtual machines to complete networking configurations and other tasks, as well as for user connections to web-based resources. A similar system is used to allow users to authenticate with the central server without connecting to it directly or needing to know its location.

Finally, during operation, Fognigma networks use a smart firewall that automatically blocks all unintended connections and uses time-sensitive cryptotokens to allow approved connections while hiding exchanges. This creates a reduced network profile that makes networks functionally invisible to potential attackers.

The nature of the architecture and design of FOGNIGMA allows it to scale, integrate, and operate with existing systems and networks in the U.S. and abroad, allowing the addition of new capabilities and enabling collaboration with U.S. and multinational entities. Zero Trust architecture designed with three layers of encryption (using multiple encryption libraries) reduces the risk of insider attacks. Customizable automation features enable scaling and allow FOGNIGMA to rapidly facilitate the integration of new users and partners and adapt to changing mission needs, without incurring excessive cost; degrading performance; interrupting operations; exposing user relationships and identities, data, or sensitive resource IPs; or requiring extensive technical expertise or administration. The software can be integrated in a day, and complete networks can be deployed and ready to use in less than an hour. Fognigma’s crypto module is FIPS 140-3 Inside (certificate #4724).    

______________________________________________

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly-facing content is permissible in DISA TEM sessions.

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.