The power of multiple DNS firewalls, combined to work in real-time harmony. Sum your favourite DNS service’s results into a concerto of a firewall power-house.
A gift to the world from what we have. We’re offering part of our technology as a freemium model to the security community packaged as DNSharmony: an on-premise DNS caching forwarder that harmonizes answers from multiple upstream services by consensus.
This allows you to sum the power of multiple public DNS filters to function in harmony and combines the power of all of them. Flexible controls are included to allow users to customize how this protects the people they care about.
Licensing or Whitelabel Options
We play well with others and love sharing our toys! For OEM & MSP clients, multiple parts of the ADAM technology are available as stand-alone elements that could be integrated in their security stacks.
Here’s how it works: DNS firewalls and filters are productive tools to prevent devices from making unauthorized connections via DNS. The IP Enforcer extends that protection in cases that lack a prior, successful DNS lookup. For example, a direct IP connection attempt to 18.104.22.168 will fail. However, it will succeed if www.google.com was first resolved (22.214.171.124 is one of www.google.com’s SafeSearch IPv4 DNS A records).
There’s a reason you want your traffic to look to a DNS firewall and filters. We believe it is important as much as you do.
Blacklist oriented protection has two critical hurdles we can overcome: 1. Someone needs to get hurt first before the blacklist entry is made. (We don’t like that victim to be you). And 2. In a world where more than a million threats per day are discovered, and more than a million domains registered each month with 85% estimated for malicious use; threats are growing faster than blacklists. It’s not difficult to see that with a blacklist approach, you’re always behind the 8-ball trying to catch up. Adaptive whitelisting changes the game.
Our technology has finally matured this concept into practical deny-all policies that adapts as you need it to. With adam:RES, you tell the Internet what you want it to be. Re-shape the online world for your users.
Our technology could empower you to write your own rules for Internet Security while maintaining your own client base. With adam:GHOST, you can integrate adam:ONE’s power into your own billing system with the flexibility to create your own subscription models. You also have control to provide your own support, with backup from our white label support elements.
We like making this world a better place and play well with others that want to do the same. Your clients will enjoy that too.
Take back control over the Internet. Re-shape it to be whatever you need it to be… Erase the dark web from your online reality and prevent bad actors from violating the systems and people you protect.
Operating from a Zero Trust approach, adam:ONE is a sum of security services that work together to create a powerful synergy umbrella of protection. We do what all the serious players do to cover the basics, but then there are some things we do that completely change the game…
The first is by giving you the ability to harmonize response from an aggregated collection of DNS firewalls of your choice. In addition, this is summed with the ADAM AI driven Outbound DNS firewall: an AI Adaptive Whitelisting system that allows you to re-shape the Internet to be whatever you need it to be - constantly evolving to your needs on a dynamic basis. As an additional layer a Don’t Talk to Strangers module (DTTS) leak-proofs your DNS filtering by denying all dns-less traffic, except for those strictly approved by you - The silver bullet for egress control. Let them come. They’re not getting out…
Oh yes! Did we mention you can apply role specific policies to individual devices without the need to install any endpoint software? Your world and the world of the people you protect just got a whole lot brighter…
With adam:ONE Zero Trust Whitelisting is more than just a philosophical utopia. The practicality barrier is finally overcome! The security layers needed to put an effective Zero-day kill switch in your hands has arrived.
Key services and features:
When all services of ADAM are combined, the net result is adam:ONE: A military grade security service that runs on dedicated hardware, that allows you maximum flexibility to provide role-specific policies to devices and tracks them throughout your network without requiring any endpoint software installation.
What could this look like? With the protection of adam:ONE, an IoT device can deliver its intended functionality, and nothing else. Protect your critical servers by permitting an IoT device to reach out to its vendor for application updates, and nothing else. End-users can experience a dynamically growing whitelist without the risk of phishing, malware, ransomware or c2 launches running on their hosts… It’s a whole new experience of the Internet. Keep the good, without any of the bad.
*There is not a single publicized Internet security threat over the last 30 years that would have been able to succeed if adam:ONE was deployed on the targeted network. (This includes Stuxnet, Wannacry, NotPetya, the Ethereum attack, Equifax Breach etc.)
Sounds to good to be true? That’s exactly why we are so excited to share this with the world. Elements from our adam:ONE offering has been running successfully as whitelisted security layers on large enterprise solutions over the last few years with incredible results. If you see it in action you will understand what we’re so excited about… (Head over to the ADAM_elements section to get more details.) We decided it’s time the world gets access to the tools that can fix what’s wrong with the Internet.
We care about people, and stewarding this technology to be accessible by the good guys is our way of allowing others to protect the networks and people they care about.
Find out more about DTTS, Adaptive Whitelisting and the power it gives you to re-write the rules for internet security.
*adam:ONE fully operational as designed.