ABOUT US | FOGNIGMA

WHAT IS

Fognigma?

Fognigma's patented software lets you build secure, invisible, adaptable networks anywhere. Inside a Fognigma Network, administrators can quickly deploy end-to-end encrypted, traceless collaboration tools – messaging, video conferencing, file sharing, phone, and more.

Each Fognigma Network is completely private to and owned by your organization, invisible to third parties, and able to be destroyed whenever the mission is complete (or as part of a routine burn/rebuild program for added security).

Fognigma Networks can deploy collaboration resources on either public or private clouds, ensuring the most economical integration to maximize flexibility, efficiency, and resiliency. With Fognigma’s powerful technology and easy-to-use interface, your organization can move from exposed to invisible in minutes.

FOGNIGMA

Unique Features

Fognigma is the only secure communications platform intentionally built to be owned and operated by the customer. It provides organizations many unique advantages, such as:

Icons_SpeakEasy_118x118_v01

Invisible Networks

Fognigma Networks are comprised of a set of components simultaneously hosted privately and/or in the commercial cloud that can be destroyed and replaced as needed. No one will be able to tell if or where your network exists.

Icons_How_it_Works_118x118_v04

Rapid Deployment

Offering instant scalability, Fognigma Networks are built through an easy-to-use web interface with just a few mouse clicks. Select the components you want and where you want them, add your users, and your multi-cloud network will be created in no time.

Icons_How_it_Works_118x118_v05

Granular Use Control

One of the best ways to prevent insider threats is to limit user access. Fognigma Networks provide admins granular user controls, allowing Identity and Access Management to be easily monitored and adapted as needed.

Icons_SpeakEasy_118x118_v04

Full Encryption

Every connection inside a Fognigma Network is wrapped in FIPS 140-2 validated, cascading AES-256 encryption. Once a user connects to a network, they are surrounded by the same encryption and disassociation as all the components in the Fognigma Network.

Icons_How_it_Works_118x118_v02

On-Demand Availability

Networks are very time consuming and expensive to maintain, requiring 24/7 monitoring for threats. Fognigma Networks can be built on demand or scheduled to exist only when needed, saving resources and money.

Icons_SpeakEasy_118x118_v03

Global Access

Your operation can take you all over the world, and your network needs to be there with you. Fognigma Networks can be accessed anywhere in the world to ensure you have the tools you need for mission success.

Icons_SpeakEasy_118x118_v06

Burn After Use Capability

Destroy your networks with the click of a button or as part of a schedule. When a Fognigma Network is destroyed, all components are wiped and overwritten by the cloud providers, eliminating all trace they ever existed.

Icons_How_it_Works_118x118_v03

Works On Any Device

Users need to be able to access your network on whatever device they’re using. Fognigma Networks work on desktop and mobile devices running all major operating systems (Windows, Linux, macOS, iOS, and Android).

ITES-2W2-logo_200x200

Army CHESS ITES-SW2

FOGNIGMA

Government Purchasing Vehicles

Procurement choices that are accessible and convenient

SEWP_V_logo

NASA SEWP V

 

 

FOGNIGMA

Additional Security

Fognigma is constantly in development to deepen and strengthen security at every level. Some additional aspects that make Fognigma so secure include

FIPS-validated-300x300

FIPS 140-2 Validation

1

Not content to use third-party FIPS compliant modules, Fognigma has been independently tested and certified as FIPS 140-2 Validated (cert. #3284).

 
cropped-wolfssl_logo_300px

Wolf SSL

2

With the integration of wolfSSL, Fognigma uses two different encryption libraries (wolfSSL and OpenSSL) running two different cyphers (ChaCha20 and AES-256-GCM) and using TLS 1.3 whenever possible.

431461

Open Source Testing

3

 

Fognigma uses Black Duck to monitor the open source code we've incorporated into the tools and components used by Fognigma. Black Duck monitors open source code for vulnerabilities, glitches, and fixes, making sure all code used in Fognigma is protected.

Image-56-1

Patented Innovation

4

Fognigma holds 35+ issued patents for their unrivaled innovations.

FOGNIGMA INTEGRATES INTO THESEINFRASTRUCTURE AS SERVICE PROVIDERS

FOGNIGMA INTEGRATES INTO THESEPLATFORMSAS SERVICE PROVIDERS

Global Regions
Data Centers
Major Cloud Providers
Continents