Traditional defensive methods for the security of digital information contain some form of encryption, some reference in the form of a data string (key/key pair's) and possibly some form of access authentication (PIN or password). These techniques perform their narrow function without providing any confidence in the devices used, the security of the data when stored, or the route taken by information over the underlying network infrastructure.

Intermix is an information defense solution that focuses on the three elements of two party system, identity of the device, instance of use and information being delivered. Applying unique technology to these three elements and the inclusion of cryptographic and policing strategies is the mission of Intermix.

Intermix will be available in the spring of 2018, some of the key capabilities are listed below.

Intermix Features

Intermix introduces environmental tethering for applications requiring strong authentication at systems levels.

Intermix applies information defense and authorization procedures at the point of use.

Intermix machine identifiers and non linear cyber techniques improve instance and route validation across any infrastructure.

Intermix strong disruptive encryption for data At-Rest and In-Flight without key sharing issues produces unusable data in unauthorized incidents.

Intermix is applicable to cloud, communications and plant infrastructure systems.