WHAT WE DO

Our Services

WHAT WE DO

Data Security. Solved.

BOLO applies a fundamentally different approach to data security 4 ways:

  • BOLO’s Random Byte Shuffling (RBS)/Random Packet Scattering (RPS) technologies process any data set at the byte level, applying typical TCIP payload of 1460 bytes into 7.3 x 103987 shuffling combinations. By comparison, 256-bit AES encryption is limited to 1.15 x 1077 combinations.
  • The RBS/RPS process is orders of magnitude faster than traditional encryption, virtually eliminating processing delay. Encrypting 32 bytes of data typically requires up to 40 clock cycles – RBS/RPS scatters bytes more efficiently, requiring only 5 clock cycles for the same payload.
  • BOLO does not rely on an underlying encryption algorithm. Digital signatures are mapped to the “shuffling state” of the underlying data and applied to “de-shuffle” the data using a BOLO device to restore it to its original state. This process leaves no trace of how the data has been processed. Each process run applies a new random pattern that is never repeated.
  • BOLO’s process outputs are generated using digital signatures calculated over the entire data set, vastly increasing security.

OFFERS INHERENT PROTECTION AGAINST

Random Byte Shuffling eliminates any data threat, including trojan horses, malware, viruses and executable code, including Java, JavaScript, PHP, C#, Dojo, Python, Elixir, Rust, Go, TypeScript, Ruby on Rails and Swift.

IDEAL FOR REAL-TIME COMMUNICATION

Random Byte Shuffling process is executed at line rate – orders of magnitude faster than traditional encryption, virtually eliminating process delay.  RBS requires 5 clock cycles to process a 32-byte data payload that would take conventional encryption up to 40 clock cycles.

ANY DATA

Random Byte Shuffling protects any data, regardless of type, size or format, whether at rest or in transit.

OS AGNOSTIC

Random Byte Shuffling protects any data, regardless of OS

UNDETECTABLE

Random Byte Shuffling leaves no trace of how data has been processed – there is no remnant of the shuffling process in the data being stored or transmitted.

INFINITE RANDOMNESS

Each Random Byte Shuffling process run applies a new random pattern that is never repeated. Process outputs are generated using digital signatures calculated over the entire data set, vastly increasing security.

NEW SECURITY STANDARD

Random Byte Shuffling derives its power by applying Random Byte Shuffling (RBS) technology that processes any data payload at the byte level, applying 7.3 x 103917 shuffling combinations.  By comparison, 256-bit AES encryption is limited to 1.15 x 1077 combinations.

TRANSPARENT INSTALLATION INTO EXISTING NETWORKS

Random Byte Shuffling works transparently. There are no changes to your network setup required.

DAY ZERO ATTACK PREVENTION

Random Byte Shuffling in front of you server protects your data from malicious code attacks.  The BOLO appliance obfuscates all data including the attack itself, rending it useless on the server.

NEW SECURITY STANDARD

BOLO derives its power by applying Random Byte Shuffling (RBS) technology that processes any data payload at the byte level, applying 7.3 x 103917 shuffling combinations. By comparison, 256-bit AES encryption is limited to 1.15 x 1077 combinations.

Transparent Delivery

BOLO RBS works transparently – it does not rely on an underlying encryption algorithm related to the data payload. Digital signatures are mapped to the “shuffling state” of the data at its origin and applied to “de-shuffle” that data using a BOLO device to restore the data. The process leaves no trace in the data payload of how the data has been processed. Each process run applies a new random pattern that is never repeated. No changes to your existing network setup are required.

Complete Data Security

BOLO’s outputs are generated using digital signatures calculated over the entire data set, vastly increasing overall security. It protects any data, regardless of OS, size or format, whether at rest or in motion. Random Byte Shuffling eliminates any data threat, including trojan horses, malware, viruses and executable code, including Java, JavaScript, PHP, C#, Dojo, Python, Elixir, Rust, Go, TypeScript, Ruby on Rails and Swift.