Skip to main content

Securing communications on anything, anywhere.

Windows

MacOS

Debian (x64/ARM)

Embedded Systems

Making the impossible our industry standard.

Some SDZT features

Post-Quantum Encryption

We utilise industry-standard post-quantum cryptographic algorithms as our baseline encryption.

In-kernel connections

We establish connectivity entirely in RAM via the kernel, making interception harder & routing easier.

Rapid rekeying

Connection streams rekey every 60-120 seconds, with zero packet loss or dropouts.

Single-use Connections

Every connection is unique, and tunnel keys are shredded upon connection, making connection hijacking extremely harder.

Zero IP collisions

IP negotiation ensures SDZT never interferes with another connection, no matter how many you have.

True Zero Trust

SDZT allows you to quickly implement a Zero Trust network architecture without the headache.

Plus many more security features, and customisations bespoke to your needs.

SDZT works over any network

Conventional networks

Software Defined Zero Trust (SDZT) has been developed with conventional networking topographies and architectures in mind, and has been developed and tested to fully saturate the available network size. Additional layers of security allow services to be run from any local & ‘free coffee shop’ networks anywhere in the world, with peace of mind that communication streams remain untampered.

Wired networks inherit these features too, with additional tried and tested intergrations with connections from the router out (as well as BGP routing for data centre and infrastructure routing), and cellular over 4 & 5G – with zero packet loss or dropouts during network & tower handover for stationary fixed-wireless installations, and whilst on the go.

Terrestrial networks

Our secure communications protocol is also extensively tested over alternative communication methods, including offline ad-hoc networks (in offices, in the field, or in dark sites). Similarly, SDZT functions reliably over IP-enabled RF links, such as area radio networks, and line of sight (including microwave and millimetre) wave links.

Satellite uplinks

Utilising our techology on satellite communication enabled devices established uplinks that are extremely quick to connect and route – with no dropout or packet loss during satellite handover or network rekeying, observable over satellites in low, high, and geostationary orbit paths, on commercial and private satellite networks – including StarLink (over public ipv6 internet) and StarShield (in sub-tunnelled environments).

Everlast has conducted extensive testing of SDZT over wireless methods during driving conditions, and whilst flying low and high/cruising altitudes (latter between 912 km/h to 975 km/h) without dropout or latency problems that other connectivity methods encountered.

In specific cases, customers and users of SDZT noted that routing of services in some regions (over broadband internet, cellular, RF, and StarLink) was improved, as we often negotiate the fastest route to service, and connections remained online and stable in fixed installations.

FAQ: About

What is SDZT?

Software Defined Zero Trust is a connection & communication standard/protocol created by us. It allows for rapidly created connections, which are unique, private, and extremely secure.

How did it start?

Initially conceived to protect customer data during transactions with APIs and databases, our technology has evolved into a universal solution for ‘True Zero-Trust’ connectivity.

SDZT now safeguards endpoints, data in transit, VoIP/video conferencing, emails, and other critical communications.

With applications spanning systems used by government, defence, enterprises, and beyond, we provide a comprehensive way to connect securely in today’s complex digital landscape.

Do my users need to 'sign in' to SDZT?

SDZT has a hardware and connection keying fingerprint that is created uniquely to your organisation. This allows for zero trust architecture based on the physical user, embedded, or autonomous device itself.

Does SDZT work on mobile devices?

Currently, we are focusing on computer, router/server, and embedded systems as per demand requirements. We’re working on mobile phone (Android + iOS) implementations.

Is SDZT available in my country?

SDZT is available to private, government, and defence organisations within Five-Eyes and AUKUS countries only.

How fast is it?

In terrestrial, RF, and satcom tests, SDZT was observed to run at speeds reflective of the link or internet connection speed. In some cases using cellular and satcom, it was observed that speed had increased slightly, and latency had decreased – as SDZT renegotiates the fastest route constantly.

FAQ: Implementation

How does licensing work?

Licenses are made bespoke for your organisation and its requirements. However, for more discerning customers, the license management system can also be hosted internally.

How does it compare against SASE & ZTNA?

Our Software Defined Zero Trust (SDZT) technology is unique from traditional Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) providers models, by offering unique flexibility and security, with no compromise in hardware, software, and infrastructure.

SDZT can facilitate the creation of a robust custom SASE architecture by using your own infrastructure, eliminating the need for costly rebuilds with its easy-to-implement wrapper approach. Our technology brings on stronger encryption through rapid rekeying protocols, and maintains invisible, in-kernel connections that hide your communications from external parties.

Furthermore, our dynamic DNS system automatically resolves frustrating routing and deployment issues commonly seen in SASE, ZTNA, and VPN providers – ensuring smooth, secure True Zero Trust access to resources across your fleet devices, without the management and admin complexity typically associated with existing solutions – and without anyone touching or routing your data at all.

All of this can be applied to any existing communications, ports, or services you wish to route or tunnel on-demand, facilitating post-quantum encryption of anything you, your project, or your organisation requires.

How do I get started?

Have a conversation with our team to get started.

Under the hood