{"id":13022,"date":"2023-12-01T02:26:31","date_gmt":"2023-12-01T02:26:31","guid":{"rendered":"http:\/\/127.0.0.1\/?page_id=13022"},"modified":"2023-12-01T02:34:24","modified_gmt":"2023-12-01T02:34:24","slug":"newsroom","status":"publish","type":"page","link":"http:\/\/127.0.0.1\/newsroom\/","title":{"rendered":"Newsroom"},"content":{"rendered":"\n

Great Wing Makes the Internet Safer with Revolutionary New Cybersecurity Product<\/h2>\n\n\n\n

Installs first \u201cinvisible VPN\u201d that cannot be disturbed or hacked<\/em><\/p>\n\n\n\n

NEW YORK, November 30, 2023<\/strong> \u2013 Great Wing, a cybersecurity company that developed patented quantum-resistant encryption that establishes zero-trust environments, announces the first deployment of its patented DefenceDome Distributed\u2122 network protection solution.<\/p>\n\n\n\n

DefenceDome Distributed runs a Ghost\u2122 process at each node, rendering communications invisible to and inaccessible from the LAN or internet\u2014preventing eavesdropping, hacking, spoofing and denial of service (DoS) attacks.<\/p>\n\n\n\n

Ghost\u2122 initializes the Wormhole\u2122, a hardened TCP\/UDP\/ICMP-encrypted protocol that anonymizes and obfuscates network packets. With DefenceDome Distributed, the Wormhole becomes the only way to communicate throughout the network.<\/p>\n\n\n\n

\u201cMost cybersecurity solutions communicate using TCP\/IP, which is buggy. Great Wing\u2019s DefenceDome technology is markedly different\u2014and safer\u2014because it uses a unique protocol called the Wormhole that solves many of TCP\/IP\u2019s inherent problems. At the same time, it gives the appearance of TCP\/IP so it can pass through the internet, yet remains undetected,\u201d explained Great Wing CEO Moshe Ben-Benjamin. \u201cAny communication that travels through the Wormhole will be quantum-resistant because of the chaotic nature of the Wormhole.\u201d<\/p>\n\n\n\n

<\/p>\n\n\n

\n
\"\"<\/figure><\/div>\n\n\n

.<\/p>\n\n\n\n

The first deployment of DefenceDome protects multiple servers at the corporate location of Pro Locksmith & Security, a company that installs smart homes and provides access control to multi-tenant buildings. It connects multiple servers running different operating systems (Microsoft Windows and Linux) to multiple remote sites through different internet service providers (ISPs). \u201cI have worked with many cybersecurity products over the years and I have never before experienced such a straightforward and easy configuration and installation,\u201d said Yoni Hakim, CEO of Pro Locksmith & Security.<\/p>\n\n\n\n

\u201cAll communications have been running seamlessly with no breaches, and the Wormhole has even increased the throughput of the network,\u201d said Ben-Benjamin.<\/p>\n\n\n\n

A penetration tester who was given the IP address of the customer\u2019s network was not able to detect the existence of the network. \u201cNormally when conducting reconnaissance, we can see some of the network devices, such as routers and servers, and the services they are providing. That\u2019s a prerequisite for launching an attack. But with the Great Wing network I was not able to see anything,\u201d said Alex Comerford, a cyber expert who conducted the pentest.<\/p>\n\n\n\n

DefenceDome technology seamlessly integrates into existing networks without the need for configuration adjustments or infrastructure modifications. \u201cWe\u2019ve designed DefenceDome from the ground up to be compatible with any network, even in the cloud. You don\u2019t need to adapt to DefenceDome; rather, DefenceDome adapts to you,\u201d explained Ben-Benjamin.<\/p>\n\n\n\n

DefenceDome software can be used on its own or with any existing cybersecurity software that uses a TCP\/UDP\/ICMP networking stack to increase the security. Products like VPNs, encrypted protocols (TLS\/SSL, IPsec, etc.), or even SASE architectures based on these networking stacks can be made more secure (or hardened) at zero performance cost. Businesses now have the ability to effortlessly de-risk their most complicated tools and networks.<\/p>\n\n\n\n

\u00ad\u00ad\u00adAbout Great Wing<\/strong><\/strong><\/p>\n\n\n\n

Great Wing is a cybersecurity company that protects networks by rendering all network traffic invisible to the internet, placing it beyond the reach of bad actors\u2014making communications quantum-resistant and creating a zero-trust environment. The patented technology requires no changes to an organization\u2019s infrastructure and can be used standalone or together with existing cybersecurity solutions to make them stronger. Learn more at greatwing.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Great Wing Makes the Internet Safer with Revolutionary New Cybersecurity Product Installs first \u201cinvisible VPN\u201d that cannot be disturbed or hacked NEW YORK, November 30, 2023 \u2013 Great Wing, a cybersecurity company that developed patented quantum-resistant encryption that establishes zero-trust environments, announces the first deployment of its patented DefenceDome Distributed\u2122 network protection solution. DefenceDome Distributed […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/13022"}],"collection":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=13022"}],"version-history":[{"count":7,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/13022\/revisions"}],"predecessor-version":[{"id":13031,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/13022\/revisions\/13031"}],"wp:attachment":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=13022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}