ABOUT US | FOGNIGMA
WHAT IS
Fognigma?
Fognigma's patented software lets you build secure, invisible, adaptable networks anywhere. Inside a Fognigma Network, administrators can quickly deploy end-to-end encrypted, traceless collaboration tools – messaging, video conferencing, file sharing, phone, and more.
Each Fognigma Network is completely private to and owned by your organization, invisible to third parties, and able to be destroyed whenever the mission is complete (or as part of a routine burn/rebuild program for added security).
Fognigma Networks can deploy collaboration resources on either public or private clouds, ensuring the most economical integration to maximize flexibility, efficiency, and resiliency. With Fognigma’s powerful technology and easy-to-use interface, your organization can move from exposed to invisible in minutes.
FOGNIGMA
Unique Features
Fognigma is the only secure communications platform intentionally built to be owned and operated by the customer. It provides organizations many unique advantages, such as:
Invisible Networks
Fognigma Networks are comprised of a set of components simultaneously hosted privately and/or in the commercial cloud that can be destroyed and replaced as needed. No one will be able to tell if or where your network exists.
Rapid Deployment
Offering instant scalability, Fognigma Networks are built through an easy-to-use web interface with just a few mouse clicks. Select the components you want and where you want them, add your users, and your multi-cloud network will be created in no time.
Granular Use Control
One of the best ways to prevent insider threats is to limit user access. Fognigma Networks provide admins granular user controls, allowing Identity and Access Management to be easily monitored and adapted as needed.
Full Encryption
Every connection inside a Fognigma Network is wrapped in FIPS 140-2 validated, cascading AES-256 encryption. Once a user connects to a network, they are surrounded by the same encryption and disassociation as all the components in the Fognigma Network.
On-Demand Availability
Networks are very time consuming and expensive to maintain, requiring 24/7 monitoring for threats. Fognigma Networks can be built on demand or scheduled to exist only when needed, saving resources and money.
Global Access
Your operation can take you all over the world, and your network needs to be there with you. Fognigma Networks can be accessed anywhere in the world to ensure you have the tools you need for mission success.
Burn After Use Capability
Destroy your networks with the click of a button or as part of a schedule. When a Fognigma Network is destroyed, all components are wiped and overwritten by the cloud providers, eliminating all trace they ever existed.
Works On Any Device
Users need to be able to access your network on whatever device they’re using. Fognigma Networks work on desktop and mobile devices running all major operating systems (Windows, Linux, macOS, iOS, and Android).
Army CHESS ITES-SW2
FOGNIGMA
Government Purchasing Vehicles
Procurement choices that are accessible and convenient
NASA SEWP V
FOGNIGMA
Additional Security
Fognigma is constantly in development to deepen and strengthen security at every level. Some additional aspects that make Fognigma so secure include
FIPS 140-2 Validation
1
Not content to use third-party FIPS compliant modules, Fognigma has been independently tested and certified as FIPS 140-2 Validated (cert. #3284).
Wolf SSL
2
With the integration of wolfSSL, Fognigma uses two different encryption libraries (wolfSSL and OpenSSL) running two different cyphers (ChaCha20 and AES-256-GCM) and using TLS 1.3 whenever possible.
Open Source Testing
3
Fognigma uses Black Duck to monitor the open source code we've incorporated into the tools and components used by Fognigma. Black Duck monitors open source code for vulnerabilities, glitches, and fixes, making sure all code used in Fognigma is protected.
Patented Innovation
4
Fognigma holds 35+ issued patents for their unrivaled innovations.