Many Components. One Complete Solution.

OPAQUE PLATFORM

THE CORNERSTONE OF OUR PATENTED COUNTER-EXPLOITATION SYSTEM

Opaque leverages model-driven AI to create scaleable virtual environments for your enterprise to conduct business online. The patented privacy orchestration platform integrates with existing enterprise services like single-sign-on, proxies, data analysis, and dashboarding tools. The software’s open-source structure enables rapid deployments, continuous patching and updates, cloud management, sandboxing and more. Most importantly, Opaque provides a comprehensive data set needed to create rich audit and reporting functions and satisfy regulatory, compliance and risk analytics. The Opaque platform reduces the need for in-house talent with embedded counter-exploitation tradecraft and automated cybersecurity.

THE OPAQUE COMPANION

PREVENTING DATA EXPOSURE, EVEN WHEN YOU’RE OUT OF THE OFFICE

Maintaining privacy and security on your own servers and network is crucial. But maintaining that same level of security when traveling or working remotely can be difficult. The Opaque Companion gives employees the opportunity to access the digital world from their home, a client’s office or anywhere in the world — all with the same level of privacy provided in the workplace.

ADVISORY SERVICES & TRADECRAFT

BRINGING CYBER TRADECRAFT AND HIGH-END ENGINEERING TO OUR CUSTOMERS

Our goal is to be a guide for your organization, helping traverse the evolving risks of cyber exploitation and digital privacy by applying solutions and proven tradecraft leveraging our commercial, government, and international experience.

MANAGED SERVICE, SAAS, OR SELF-MANAGED

WORKS WITH YOUR EXISTING INFRASTRUCTURE

PATENTED MODEL-DRIVEN AI

ENHANCED AUDIT CAPABILITIES

THE MOST COMPREHENSIVE AND EXTENSIBLE COUNTER-EXPLOITATION PLATFORM EVER DEVELOPED FOR THE ENTERPRISE.

OVER 30 FEATURES DESIGNED WITH YOUR SECURITY IN MIND.

  • User Self-Registration
  • User Password Reset
  • LDAP Integration
  • SAML 2.0 Integration
  • Multi-Factor Authentication
  • Kerberos Brokering
  • Video Recording
  • Keystroke Capture
  • Protocol Transcoding
  • DNS Logging
  • HTTP/S Logging
  • Custom Log Parsing
  • External File Sync (e.g. S3, Dropbox)
  • VPN-Ready
  • Cloud Agnostic
  • Fault Tolerant
  • Resilient Systems
  • Resource Dashboards
  • Logging Reports
  • Cloud Resource Optimization
  • Virtual Machine Auto-Scaling
  • Extensibility Tools
  • Daily Vulnerability Scans
  • Global Egress Options
  • Windows and Linux Support
  • Realtime User Monitoring
  • Rapid Initial Deployments
  • Scalable Test Environments
  • Privacy-Optimized Browsers
  • On-Prem Ready