SmokeNet is a Next Generation Private Networking (NGPN) technology. SmokeNet uses Moving Target Defense to completely protect your data from all network vulnerabilities. VPN and other encryption technologies do not do this. Also, used to secure Top Secret information around the world, the encryption method SmokeNet uses is much stronger.
SmokeNet is delivered as hardware, either as a WiFi access point or a plug and play USB network adapter. For a company network or a wired home, it can simply be a gateway for your network. Computers running Windows 10 may require a minimal driver installation for certain devices.
Yes. SmokeNet works with either wired or wireless devices.
SmokeNet replaces a VPN and provides much stronger protections. Computing power has increased to the point that VPNs have become vulnerable and obsolete. SmokeNet has zero network vulnerabilities. It uses a more secure method of encryption that cannot be cracked, even in theory.
No - SmokeNet replaces your VPN.
Current encryption standards are antiquated and no longer secure, especially in the Cloud. Introspective Networks' patented technology includes encryption that has protected Top Secret information for over 100 years. This technology has enabled this level of encryption to be used in a network.
Laptops, desktops, smartphones, tablets, and other network enabled devices can all be connected to SmokeNet.
Depending on your plan, you can connect a single device or up to five devices.
Yes. SmokeNet uses networking standards and can create secure networks of virtually any size.
No. You still need antivirus software, along with the defense measures built into your Operating System.
SmokeNet does not protect you from malware. If you are concerned there may already be malware on your computer, you should install and run a good malware removal program. There are a number of free and paid options.
Yes, that is true. We use One Time Pad encryption. That method can not be cracked; even in theory.
Yes. SmokeNet has been validated to proactively remove all network attack vectors including Man in the Middle.