WHAT WE DO

Our Services

WHAT WE DO

Data Security. Solved.

BOLO applies a fundamentally different approach to data security 4 ways:

  • BOLO’s Random Byte Shuffling (RBS)/Random Packet Scattering (RPS) technologies process any data set at the byte level, randomly transforming the byte distribution of the original data set. For example, BOLO’s RBS can transform the original byte distribution of a typical TC/IP packet payload of 1460 bytes into one of the 7.3 x 103987 possible shuffling states generated through “n!” (n factorial). By comparison, 256-bit AES encryption is limited to 1.15 x 1077 combinations.
  • BOLO process is orders of magnitude faster than traditional encryption, virtually eliminating processing delay. BOLO’s RBS virtually eliminates processing delays; randomly shuffling a typical TCP/IP packet payload of 1460 bytes in about 750 nanoseconds.
  • BOLO does not rely on an underlying encryption algorithm. Digital signatures are mapped to the “shuffling state” of the underlying data and applied to “de-shuffle” the data using a BOLO device to restore it to its original state. This process leaves no trace of how the data has been processed. Each process run applies a new random pattern that is never repeated.
  • BOLO’s process outputs are generated using digital signatures calculated over the entire data set, vastly increasing security.

OFFERS INHERENT PROTECTION AGAINST

Random Byte Shuffling eliminates any data threat, including trojan horses, malware, viruses and executable code, including Java, JavaScript, PHP, C#, Dojo, Python, Elixir, Rust, Go, TypeScript, Ruby on Rails and Swift.

IDEAL FOR REAL-TIME COMMUNICATION

Random Byte Shuffling process is executed at line rate – orders of magnitude faster than traditional encryption, virtually eliminating process delay.  RBS requires 5 clock cycles to process a 32-byte data payload that would take conventional encryption up to 40 clock cycles.

ANY DATA

Random Byte Shuffling protects any data, regardless of type, size or format, whether at rest or in transit.

OS AGNOSTIC

Random Byte Shuffling protects any data, regardless of OS

UNDETECTABLE

Random Byte Shuffling leaves no trace of how data has been processed – there is no remnant of the shuffling process in the data being stored or transmitted.

INFINITE RANDOMNESS

Each Random Byte Shuffling process run applies a new random pattern that is never repeated. Process outputs are generated using digital signatures calculated over the entire data set, vastly increasing security.

NEW SECURITY STANDARD

BOLO’s Random Byte Shuffling Technology derives its power by randomly transforming the original byte distribution of data (both for data in motion and data at rest) to a new random shuffling states. BOLO’s RBS does not rely upon complex encryption algorithms that typically involve substitutions, rotations and shifting of data bytes. BOLO RBS is inherently simple – it randomly shuffles the data bytes.

TRANSPARENT INSTALLATION INTO EXISTING NETWORKS

Random Byte Shuffling works transparently. There are no changes to your network setup required.

DAY ZERO ATTACK PREVENTION

Every malicious code is essentially composed of an array of bytes and the sequence of these “malicious bytes” must be preserved in order to launch a harmful attack. When the “malicious code” passess through the BOLO’s RBS, every single byte of the malicious code is randomly shuffled, thus disarming the malicious code functionality even for “Day Zero” Attacks.

NEW SECURITY STANDARD

BOLO derives its power by applying Random Byte Shuffling (RBS) technology that processes any data payload at the byte level, applying 7.3 x 103917 shuffling combinations. By comparison, 256-bit AES encryption is limited to 1.15 x 1077 combinations.

Transparent Delivery

BOLO RBS works transparently – it does not rely on an underlying encryption algorithm related to the data payload. Digital signatures are mapped to the “shuffling state” of the data at its origin and applied to “de-shuffle” that data using a BOLO device to restore the data. The process leaves no trace in the data payload of how the data has been processed. Each process run applies a new random pattern that is never repeated. No changes to your existing network setup are required.

Complete Data Security

BOLO’s outputs are generated using digital signatures calculated over the entire data set, vastly increasing overall security. It protects any data, regardless of OS, size or format, whether at rest or in motion. Random Byte Shuffling eliminates any data threat, including trojan horses, malware, viruses and executable code, including Java, JavaScript, PHP, C#, Dojo, Python, Elixir, Rust, Go, TypeScript, Ruby on Rails and Swift.