Cutting Edge CA is a network engineering and Internet security consulting firm that was founded in 2012 to provide leading edge, innovative, identity protected access to the Internet and cyber threat mitigation capabilities. Cutting Edge’s flagship offering is NetAbstraction, a patented, cloud-based service that obscures and varies our customer’s network pathways across multiple providers, while protecting their identity and systems. NetAbstraction lowers our customer’s cyber attack profile and traceability.

Some specific benefits we provide:
o We disguise your network communications pathways – if they can’t find you, they can’t target you!
o We dynamically shift your network – it is hard to identify or hit a moving target.
o We use a new tunneling protocol that is misidentified as normal TCP traffic, enabling the tunnels to hide, (become lost), within the traffic of the commercial provider networks.
o We use multiple providers/technologies/geographic locations to disperse and la...
Cutting Edge CA is a network engineering and Internet security consulting firm that was founded in 2012 to provide leading edge, innovative, identity protected access to the Internet and cyber threat mitigation capabilities. Cutting Edge’s flagship offering is NetAbstraction, a patented, cloud-based service that obscures and varies our customer’s network pathways across multiple providers, while protecting their identity and systems. NetAbstraction lowers our customer’s cyber attack profile and traceability.

Some specific benefits we provide:
o We disguise your network communications pathways – if they can’t find you, they can’t target you!
o We dynamically shift your network – it is hard to identify or hit a moving target.
o We use a new tunneling protocol that is misidentified as normal TCP traffic, enabling the tunnels to hide, (become lost), within the traffic of the commercial provider networks.
o We use multiple providers/technologies/geographic locations to disperse and layer your points of possible attack.
o We protect your identity by providing alternate subscriber information, which is exposed in commercial provider’s databases.
o We logically isolate each customer’s communications on top of our physical infrastructure, hiding the customer network topology from any external scrutiny.
o By creating a virtualized network, we are able to decouple the logical network from the commercial provider’s physical network. The logical decoupling of virtual servers from the physical network reduces the opportunity for attackers to reach resources connected to the network. It also protects the physical network from exploitation by a malicious actor or an insider threat.
o We regularly rotate and exchange the infrastructure that we use to establish our physical infrastructure.
o We shift our customers’ communications on a regular basis or dynamically in response to a perceived cyber threat.

While each customer's use case is slightly different, our customers are particularly interested in the following use cases:
o Identity and location protected access to the Internet for Open Source and dark web research. We provide a carrier class user experience.
o Disguised, low profile, Virtual Private Networks (VPNs) for protected communications including non-traceable communications with mobile users and non-apparent network connectivity to enable cyber operations.
o Isolated, protected hosting within a cloud or across multiple clouds.
More information

Recommendations

Chris Houser Director of Cyber Threat Intelligence, Cyber Security Innovation, & Vulnerability Mgmt at Wells Fargo

Highly recommend working with the CuttingEdge CA team. Very professional and will work with you to develop custom solutions for unique cyber use cases.