Global-WAN transparently secures everything: all network applications and the IoT – from RFID tags to datacenters.
- blockchains: free payment processors from KYC and AML compliance costs and enforce the tax code.
- identities: provide every person and IoT on the planet with a scalable tamper-proof digital identity.
- storage: remove unwanted interferences whatever the involved third-parties and their foreign data policies.
- IoT: SIM cards, microSD cards, radios, modems; IoT security: the frontier to cross to reach the market.
- Web: sell, shop,
phone, faxPhones & fax machines
You continue to use your analog (PSTN) phones
(wired or cordless) and fax, as usual: All the calls made via a Global-WAN gate are protected , mailE-mail
(unreadable and untraceable: who/when/where).
To enjoy secure emails, a dedicated mail server
is required* on each Global-WAN user's LAN: All the mail exchanged via a Global-WAN gate is protected , chat, use videoconferencingVideo conferencing
(unreadable and untraceable: who/when/where).
(*): Global-WAN gates will soon embed a mail server to
remove this constraint.
Use your third-party video conferencing tools
as usual: All the calls made via a Global-WAN gate are protected – without everything you do being hacked.
(unreadable and untraceable: who/when/where).
Note: "Cloud videoconferencing services" must also use
a Global-WAN gate. - SaaS: restrict Web services to authorized users only to eliminate fraud, attacks, and security breaches.
- Cloud: exchange, process and store in an always-on, fail-safe network made of globally distributed nodes.
| In today's global mobile world, no one can afford to stay isolated. But being connected should not necessarily mean being vulnerable. Global-WAN allows you to stay connected, and even deploy innovating Internet of Things (IoT) applications, without having to worry about unlawful data interception, hacking, and sabotage. Each user group communicating at a given time builds an ephemeral and impenetrable private Cloud to interconnect services, machines, and networks [1]. Global-WAN relies on a decentralized architecture so end-users can either operate it from their LAN or mobile devices. Optionally, large organizations can also control their Global-WAN deployments from a centralized place. |
Excluding unauthorized users by-design, TrustLeap makes it impossible
for criminals to intercept your communications.
Global-WAN closes the doors left
widely open to your computers, LANs, services, databases and intellectual property.
[1]: All network applications (Email, LDAP, VoIP, Chat, Web, etc.) run without configuration on Global-WAN. As time goes, TrustLeap and other software publishers will develop a new kind of applications that directly benefit from Global-WAN's resilient and neutral design, an environment which neutrality is guaranteed regardless to the amounts of power involved to subvert it.