Dispersive

Mindcore Secure Workspace Solutions Powered by
Tehama Technology

Schedule Your Consultation

MSSP Alert Top 250 MSSP 2024
bronze award

Schedule Your Free Consultation

This field is for validation purposes and should be left unchanged.
Name(Required)
Your contact information is confidential and will not be sold or shared with third parties. No Obligation • 100% Confidential

Core Technology Overview

Origin & Background

Dispersive emerged from a DARPA project and holds 53+ patents, originally designed for military-grade secure communications. It is now being commercialized for enterprise use.

Web Management Icon
Core Mechanism
  • Uses session splitting and multiple rotating encryptions instead of standard VPN tunnels.
  • Data packets are dispersed across multiple independent paths (“deflex nodes”), each with different encryption keys.
  • Nodes don’t know what traffic they carry, increasing anonymity and resistance to interception.
  • Appears as UDP traffic, masking real data as typical streaming or video content.
Antivirus
Performance Benefits
  • Up to 10× improvement in throughput and 20% less latency versus traditional Internet routing.
  • Cloud-agnostic — supports AWS, Azure, GCP, or custom nodes.
  • Tunnel-less connectivity: avoids IPsec/GRE tunnels, reducing complexity and overhead.
  • Ephemeral sessions: inactive sessions drop after 15 seconds, leaving no trace.

Deployment & Support

Deployment Models

  • Dispersive Cloud (SaaS) – fully managed by Dispersive.
  • Dispersive Fabric – self-managed model.
  • Client Software – for remote or mobile users.
  • Gateways can be virtual or physical (Lanner 1513/1515 series).
Dsipersive Zero Trust Fabric
Dispersives Secure Multi Path

Support Model

  • Onboarding via Zendesk portal with training and ongoing success check-ins.
  • Two support tiers: business-hours (standard) and 24/7 (premium).
  • Designed to be largely “set-and-forget” once deployed.

Use Cases

Identity Aware Isolation and Policies Permit Only Zero Trust Authenticated Access
  • Zero Trust Access for healthcare, finance, and enterprise networks.
  • Cloud WAN and Secure Remote Access (especially for hospitals with distributed users).
  • AI Isolation: protects model inference data and prompts from IP theft.
  • IoT & Camera Protection: improves latency and secures live feeds.
  • Satellite/5G Optimization: reduces latency by 30–40% even over high-latency links (e.g., Starlink).
  • CrowdStrike Integration: automated risk-based network isolation (removes risky users dynamically).

Cybersecurity Advantages

Web Management Icon
Preemptive Cyber Defense
  • Focuses on preventing breaches before they happen, not just detecting them.
  • Built on Automated Moving Target Defense (AMTD) — continuous key rotation, data interleaving, and randomization of transport paths.
  • Attackers face a constantly changing network landscape, making infiltration or interception virtually impossible.
  • Resistant to DDoS, replay, and man-in-the-middle attacks.
Antivirus
Quantum Resistance
  • Uses AES-256 and SHA-256 HMAC, with optional elliptic-curve Diffie-Hellman for anti-quantum protection.
  • Can rotate encryption keys every 15–60 minutes (configurable).