industry news
Subscribe Now

DH2i Launches DxConnect Network Security Software for Integrated Zero Trust Connectivity

Enables Developers and Network Admins to Support What Work Looks Like Today – IoT, Edge Computing, Cloud and Multi-Cloud – Without the Need for a VPN

FORT COLLINS, Co. | June 18, 2019

DH2i®, the leading provider of multi-platform Software Defined Perimeter and Smart Availability™ software for Windows and Linux, today announced the general availability launch of DxConnect™ network security software for integrated Zero Trust (ZT) connectivity.  DxConnect enables developers and network administrators to build an integrated ZT connectivity security infrastructure for cloud native applications, hybrid/multi-cloud connectivity and privileged user access without using a VPN.

The recently published 2019 Verizon Data Breach Investigations Report (DBIR) analyzed 41,686 security incidents, of which 2,013 were confirmed data breaches, and found that the majority of data breaches occurred due to technical deficiencies present in computer networks.  The report further pointed out that once cybercriminals are inside a network, their process is almost always the same: establish continued access, escalate or obtain administrator privileges, move quietly to map the entire network, look for open ports, locate the “crown jewels” and exfiltrate the data undetected for as long as possible.  The report also stated that just one data breach could cost anywhere from tens of thousands of dollars to as much as $100 million.  The recent 2018 Cost of a Data Breach Study: Global Overview by Ponemon likewise reported that the average cost of a data breach was up 6.4 percent to $3.86 million.

The technical deficiencies, or vulnerabilities, existing in today’s computer networks are being exacerbated by the explosion of the Internet of Things (IoT) and edge computing.  IoT is made up of billions of smart devices that use IP networks to talk to each other (and to us).  The IoT world is growing to a projected 28.5 billion devices by 2022.  M2M (machine-to-machine) will be more than half of the global connected devices and connections by 2022.  The need for secure privileged user access is growing faster (7 percent CAGR) than the world’s population (1 percent CAGR).  Secure cloud-native microservice connections will be the fastest growing IP connection type by 2022.*

Legacy connectivity and security approaches such as virtual private networks (VPNs) were not designed or intended for today’s data reality. This has led to issues such as complex setup and management, slow and unreliable connections, limited scalability, highly compromised and vulnerable networks and data and large, escalating costs.  DH2i’s DxConnect was designed to work with DH2i’s DxOdyssey software to tackle legacy VPN, cloud-native and privileged user access security issues.  DxConnect improves network security, was designed specifically for hybrid/multi-cloud operations, meets the scaling requirements of DevOps, IoT, containers and edge workloads, delivers faster performance, and it has an open API for integrations, analytics, visibility and compliance. A key problem it solves is it enables developers to build encrypted micro-tunnels that span isolated networks to connect containers for a secure multi-cloud service mesh. It also enables organizations to securely connect vendors to a specific cloud application without using a VPN.

“The major changes being driven by advancements such as IoT, edge computing, mobile, and cloud are creating conflicting demands for secure connectivity. The traditional ‘Castle & Moat VPN drawbridge’ security model was not designed to meet those demands,” said Eric Hanselman, Chief Analyst at 451 Research.  “And, while a wholesale rip-and-replace is certainly not recommended, enhancing legacy technology (e.g., VPNs) with an advanced Software-Defined Perimeter approach like that of DH2i’s DxConnect, would be a smart strategy to fortify and unify your organization’s connectivity security.”

“For decades, VPNs have been considered the go-to for network connectivity security.  However, VPN technology is no longer able to fully protect today’s networks.  In fact, it typically not only exposes sensitive data to increased security risk, but oftentimes multiplies those risks exponentially,” said Don Boxley, CEO and Co-Founder, DH2i.  “DH2i’s new DxConnect was designed with an innovative yet flexible architecture to navigate today’s connectivity security challenges such as connecting microservices that are running on isolated networks.  DH2i’s DxConnect supports what work looks like today and tomorrow.”

DxConnect Features and Benefits

  • Micro-Perimeters– Application-level micro-tunnels give network admins and developers the ability to create micro-perimeters to segment by application, not by network.
    • Eliminates lateral network attacks
    • Unifies HTTP, SSH and inter-microservice connectivity
    • Users/services/devices get fast, direct access to applications and services
  • Discreet Invisibility – Randomly generated non-standard UDP ports for dynamic on-demand micro-tunnel communications.
    • Virtually eliminates network attack surfaces
    • Users/services/devices are cloaked and secured with no open ports
    • Applications and services are invisible to “bad actors”
  • Multi-Cloud Ready – Designed to enable secure “from any host, to any host, anywhere” application data communications with application-level DTLS encrypted micro tunnels and Public Key Authentication.
    • Scales across hybrid/multi-cloud environments
    • Leverages native cloud platform capabilities
    • Consistent policies and auditing across hybrid/multi-cloud
    • No cloud vendor lock-in
  • Smart Availability – Dynamic movement of micro-tunnel gateways and application workloads with automatic self-healing fault detection and failover.
    • Automates and orchestrates micro-tunnel and workload creation and location
    • Enables an “always-secure and always-on” application infrastructure
  • Open API – Lightweight software with open API that runs on any Linux or Windows host.
    • Enables secure interconnection to be built into a DevOps toolchain
    • Supports Kubernetes, Docker, Chef, Puppet and more for scaling cloud-native apps
    • Hardens existing network security infrastructure (e.g. MFA, SIEM, EMM, SSO) and paths to data and services

To learn more, please visit or attend DH2i’s live DxConnect introduction webinar, “Bridging the Gap to Zero Trust Security Amidst a Changing Network Landscape,” on Wednesday, July 17, 11:00 am – 11:45 pm Pacific Time / 2:00 pm – 2:45 pm Eastern Time. Learn more about the webinar and register here: 

Tweet this: .@DH2i Launches #DxConnect #Network #Security Software for Integrated #ZeroTrust Connectivity #Edge #IoT #Cloud #VPN

About DH2i

DH2i Company is the leading provider of multi-platform Software Defined Perimeter and Smart Availability™ software for Windows and Linux. DH2i software products DxOdyssey™ and DxEnterprise® enable customers to create an entire IT infrastructure that is “always-secure and always-on.”  To learn more, please visit:, call: 800-380-5405 or +44 20 3318 9204, or email:

Leave a Reply

featured blogs
Jul 28, 2021
Here's a sticky problem. What if the entire Earth was instantaneously replaced with an equal volume of closely packed, but uncompressed blueberries?...
Jul 28, 2021
Hyperscale data centers are driving demand for high-bandwidth Ethernet protocols at speeds up to 800G to support HPC, AI, video streaming, and cloud computing. The post What's Driving the Demand for 200G, 400G, and 800G Ethernet? appeared first on From Silicon To Software....
Jul 28, 2021
After a long writing (and longer editing and approval seeking) process, the AIAA's CFD Vision 2030 Integration Committee has published its first update to the Vision's roadmap. This 71 page,... [[ Click on the title to access the full blog on the Cadence Community ...
Jul 9, 2021
Do you have questions about using the Linux OS with FPGAs? Intel is holding another 'Ask an Expert' session and the topic is 'Using Linux with Intel® SoC FPGAs.' Come and ask our experts about the various Linux OS options available to use with the integrated Arm Cortex proc...

featured video

Intelligent fall detection using TI mmWave radar sensors

Sponsored by Texas Instruments

Actively sense when a fall has occurred and take action such as sending out an alert in response. Our 60GHz antenna-on-package radar sensor (IWR6843AOP) is ideal for fall detection applications since it’s able to detect falls in large, indoor environments, can distinguish between a person sitting and falling, and utilizes a point cloud vs a person’s identifiable features, which allows the sensor to be used in areas where privacy is vital such as bathrooms and bedrooms.

Click here to explore the AOP evaluation module

featured paper

Configure the charge and discharge current separately in a reversible buck/boost regulator

Sponsored by Maxim Integrated

The design of a front-end converter can be made less complicated when minimal extra current overhead is required for charging the supercapacitor. This application note explains how to configure the reversible buck/boost converter to achieve a lighter impact on the system during the charging phase. Setting the charge current requirement to the minimum amount keeps the discharge current availability intact.

Click to read more

featured chalk talk

Medical Device Security

Sponsored by Siemens Digital Industries Software

In the new era of connected medical devices, securing embedded systems has become more important than ever. But, there is a lot medical device designers can borrow from current best-practices for embedded security in general. In this episode of Chalk Talk, Amelia Dalton chats with Robert Bates from Mentor about strategies and challenges for securing modern medical devices and systems.

Click here to download the whitepaper, "Medical Device Security: Achieving Regulatory Approval"