FAQ
Your encryption products enable remote access. Are they vulnerable to AI-driven cyber attacks?
Our encryption products are designed to provide extremely strong protection against both traditional and AI-driven cyber attacks.
Unlike systems that rely solely on standard internet protocols, our platform uses a dedicated, session-specific communication architecture through our proprietary Wormhole® protocol. Each remote connection uses a uniquely tailored protocol, significantly reducing exposure to interception, replay, or data collection attempts.
Because the Wormhole protocol prevents unauthorized observation of communication sessions, attackers—including those using AI—cannot gather sufficient data to analyze, model, or exploit communications. Even if a bad actor were able to collect limited data, it would likely be session-specific and would not remain useful in future sessions or after a short period of time.
Can I still use my current encryption method with DefenceDome products?
Yes. DefenceDome is fully compatible with your existing encryption methods.
You can continue using your current encryption standards, protocols, and implementations without
modification. DefenceDome adds an additional, quantum-resistant layer of protection that operates
alongside your existing encryption, enhancing security without disrupting current workflows,
performance, or architecture.
How do DefenceDome products work with my current encryption’s key exchange?
There will be no change to your existing key exchange system. Your current encryption protocols
continue to operate as usual, but the key exchange is routed through DefenceDome’s Wormhole®
encryption layer. This adds an extra quantum-resistant protection layer that prevents unauthorized
interception of keys during transmission.
For example, with standard SSH, any client can retrieve a server’s public key. With the Wormhole
protocol, only authorized users can access the public key, ensuring that key exchange remains secure
against eavesdropping or tampering.
I have no encryption. Will my communications be quantum resistant with DefenceDome?
Yes. DefenceDome comes with built-in quantum-resistant encryption by default. All communications
routed through the Wormhole® protocol are fully quantum-resistant. You do not need any additional
encryption to achieve this level of security, though existing encryption methods can still be used alongside
DefenceDome if desired.
A network administrator has left. Do I need to change all user and system passwords?
No, you do not need to change any passwords. Simply revoke the former administrator’s remote access
using DefenceDome’s key management system. This ensures they no longer have access, while all
existing user and system credentials remain valid and secure.
Can DefenceDome products detect and prevent Man-in-the-Middle packet modification attacks?
Yes. All DefenceDome quantum-resistant products automatically detect, block, and report Man-in-the-
Middle packet modification attacks, ensuring real-time protection and visibility across your network.
Our DefenseDome NTAC server blocked an attack from a specific IP address. Do I need to update our other NTAC servers?
No. You do not need to manually update your other NTAC servers.
Each NTAC server is designed to protect multiple assets and can be deployed in clusters anywhere globally while operating as part of a single, unified virtual NTAC environment. When one NTAC server blocks a
malicious IP address, that intelligence is automatically shared across all NTAC servers.
This means all your NTAC servers — regardless of location, whether cloud-based or on-premises — are
updated automatically and will immediately block the same malicious IP address without requiring any
manual action.
All DefenceDome products are easy to configure and install:
- Step 1: To configure your system, generate a key in our simple dialog.
- Step 2: Provision a VM or on-premises device in your environment.
- Step 3: Turn on the computer.
That’s it. You’re done.
