The power of multiple DNS firewalls, combined to work in real-time harmony. Sum your favourite DNS service’s results into a concerto of a firewall power-house.
A gift to the world from what we have. We’re offering part of our technology as a freemium model to the security community packaged as DNSharmony: an on-premise DNS caching forwarder that harmonizes answers from multiple upstream services by consensus.
This allows you to sum the power of multiple public DNS filters to function in harmony and combines the power of all of them. Flexible controls are included to allow users to customize how this protects the people they care about.
Licensing or Whitelabel Options
We play well with others and love sharing our toys! For OEM & MSP clients, multiple parts of the ADAM technology are available as stand-alone elements that could be integrated in their security stacks.
Here’s how it works: DNS firewalls and filters are productive tools to prevent devices from making unauthorized connections via DNS. The IP Enforcer extends that protection in cases that lack a prior, successful DNS lookup. For example, a direct IP connection attempt to 172.217.0.100 will fail. However, it will succeed if www.google.com was first resolved (172.217.0.100 is one of www.google.com’s SafeSearch IPv4 DNS A records).
There’s a reason you want your traffic to look to a DNS firewall and filters. We believe it is important as much as you do.
Blacklist oriented protection has two critical hurdles we can overcome: 1. Someone needs to get hurt first before the blacklist entry is made. (We don’t like that victim to be you). And 2. In a world where more than a million threats per day are discovered, and more than a million domains registered each month with 85% estimated for malicious use; threats are growing faster than blacklists. It’s not difficult to see that with a blacklist approach, you’re always behind the 8-ball trying to catch up. Adaptive whitelisting changes the game.
Our technology has finally matured this concept into practical deny-all policies that adapts as you need it to. With adam:RES, you tell the Internet what you want it to be. Re-shape the online world for your users.
Our technology could empower you to write your own rules for Internet Security while maintaining your own client base. With adam:GHOST, you can integrate adam:ONE’s power into your own billing system with the flexibility to create your own subscription models. You also have control to provide your own support, with backup from our white label support elements.
We like making this world a better place and play well with others that want to do the same. Your clients will enjoy that too.
Take back control over the Internet. Re-shape it to be whatever you need it to be… Erase the dark web from your online reality and prevent bad actors from violating the systems and people you protect.
Operating from a Zero Trust approach, adam:ONE is a sum of security services that work together to create a powerful synergy umbrella of protection. We do what all the serious players do to cover the basics, but then there are some things we do that completely change the game…
The first is by giving you the ability to harmonize response from an aggregated collection of DNS firewalls of your choice. In addition, this is summed with the ADAM AI driven Outbound DNS firewall: an AI Adaptive Whitelisting system that allows you to re-shape the Internet to be whatever you need it to be - constantly evolving to your needs on a dynamic basis. As an additional layer a Don’t Talk to Strangers module (DTTS) leak-proofs your DNS filtering by denying all dns-less traffic, except for those strictly approved by you - The silver bullet for egress control. Let them come. They’re not getting out…
Oh yes! Did we mention you can apply role specific policies to individual devices without the need to install any endpoint software? Your world and the world of the people you protect just got a whole lot brighter…
With adam:ONE Zero Trust Whitelisting is more than just a philosophical utopia. The practicality barrier is finally overcome! The security layers needed to put an effective Zero-day kill switch in your hands has arrived.
Key services and features:
When all services of ADAM are combined, the net result is adam:ONE: A military grade security service that runs on dedicated hardware, that allows you maximum flexibility to provide role-specific policies to devices and tracks them throughout your network without requiring any endpoint software installation.
What could this look like? With the protection of adam:ONE, an IoT device can deliver its intended functionality, and nothing else. Protect your critical servers by permitting an IoT device to reach out to its vendor for application updates, and nothing else. End-users can experience a dynamically growing whitelist without the risk of phishing, malware, ransomware or c2 launches running on their hosts… It’s a whole new experience of the Internet. Keep the good, without any of the bad.
*There is not a single publicized Internet security threat over the last 30 years that would have been able to succeed if adam:ONE was deployed on the targeted network. (This includes Stuxnet, Wannacry, NotPetya, the Ethereum attack, Equifax Breach etc.)
Sounds to good to be true? That’s exactly why we are so excited to share this with the world. Elements from our adam:ONE offering has been running successfully as whitelisted security layers on large enterprise solutions over the last few years with incredible results. If you see it in action you will understand what we’re so excited about… (Head over to the ADAM_elements section to get more details.) We decided it’s time the world gets access to the tools that can fix what’s wrong with the Internet.
We care about people, and stewarding this technology to be accessible by the good guys is our way of allowing others to protect the networks and people they care about.
Find out more about DTTS, Adaptive Whitelisting and the power it gives you to re-write the rules for internet security.
*adam:ONE fully operational as designed.
adam:ONE does so many nifty things. But what makes it truly unique and powerful is two “Outside the Box” features called: DTTS (Don’t Talk to Strangers) & Adaptive Whitelisting.
Leak proof filter and DNS firewall circumvention by preventing all DNS-less traffic and unauthorized connections. (Except for the ones you want to, of course). This protects all IoT devices on your network regardless of their operating systems or flavour.
And yes, this works to block Psiphon or any other known circumvention method out there.
Keeping up with the bad-guys list is a lost cause. With so many new threats every second, we’ve reached the point where we’ve decided it’s better to keep up with the good ones. We do that by taking an approach of blocking all traffic and then implementing our technology to vet any new requested connections by multiple combined methods. If deemed safe, the new location is added to the adaptive whitelist and for future visits no action is required.
If you don’t like the idea of the next victim that fills someone else’s black-list entry, or you’re tired of being behind the next move of the bad guys, you’re the kind of person that will appreciate this.
Keep what’s good in your world. Keep what is bad out.
adam:ONE combines many other features beyond DTTS and Adaptive Whitelisting including: DNSharmony, Whitelists, Blacklists, Schedules, Dynamic Rulesets, Per-Device Implementation, Ad Blocking, Behavioral Profile Blocking, Safe Search and YouTube safety modes to name a few.
Slide to choose features...
Use any supported DNS firewall to block harmful content.
Free up your mind. Speed up your web experience.
Privacy is important. Let’s treat it as such.
Block browser-based cryptocurrency mining, which slows you down.
Clean up you search results for Google and Bing searches.
Select your level of safety and force it to be applied on any selected devices.
Protect any device from going to a place that it shouldn’t.
Allow any specific device to only go where you tell it to.
Create custom rules for every group or individual device on your network.
Create custom schedule for every device or group. Decide when who has internet access and what rules are applied when.
Optimize blacklist setups for faster response from download and streaming services.
Control DNS forwarding on a per-domain basis.
Shape the internet as you go. A default block-all, allow-some rule set that uses AI and machine learning to vet net locations.
Don’t Talk to Strangers. A bullet-proof circumvention protection for your DNS firewall. All DNS-less traffic is blocked unless approved by the user.
adam:ONE security gateway managed by our team.
Support for redundant local routers.
99.9% uptime backed by Service Level Agreement and 24/7/365 direct support.
Lifetime warranty with upgrades every 3-5 years.
Secure potential human targets with training and hardware keys.
Licensed engineer on-site installation & systems integration.
Monitoring of critical operations systems.
Back to Base VPN secures mobile devices while roaming / cellular connection.
Today might be the last day of your life worrying about internet security for your organization.
The adam:ONE Managed Service Solution offers you guaranteed uptime and a commitment to service that is second to none. A set annual or triennial fee flicks the switch to allow your organization to stop having to deal with the destructive mess of today’s Internet, and focus on doing the amazing things you do.
We’re excited to make the world a better place.
Control your world and shape the Internet into what you want it to be.
Our service runs on dedicated hardware. You can choose to install our software on compatible equipment that you already own or acquire pre-configured hardware that is ready to go out of the box.
For mission critical networks, have a look at our Managed Service Solution.
A free trial is available to licensed MSPs or Network Administrators (covered by online support only). For continued use or commercial implementation, a mandatory Onboarding Package must be purchased.
The users that love us, love us a lot! We’ve created a model to allow blessing to flow back to those that promote us. Create and ambassador account, and once you reach 10 new subscribers, revenue from a portion of those 10 subscriptions (and all additional subscriptions thereafter) will flow right back into your account.
There are multiple levels of being an ambassador. Simply put, the more subscribers you add, the higher your revenue percentage.
If you’re a Managed Service Provider or an Internet Service Provider, we’d love to enhance your success in serving your clients by becoming part of your toolkit. Here’s what makes you different from an adam:ONE Ambassador.
Here’s what we offer to MSP/ISPs implementing adam:ONE:
We love MSPs. Let’s go change the world!
If you’re an industry superpower, and you’d like to build our technology into your service offering, we would gladly enable you to do that. Multiple aspects of the adam:ONE offering are individually packaged and available as adam:ELEMENTS: You pick and choose what parts of the technology you’d like to implement, and we get to work with your team to make that happen! We’ve partnered with industry giants that are currently running adam:ELEMENTS in complement with what makes their service offering special with roaring success. We love that, and their clients do too.
The complete adam:ONE package is available as a white label called: adam:GHOST.
Our technology could empower you to write your own rules for Internet Security. We like making this world a better place and we know your clients will enjoy that too.