You are here

Virtualized Trusted Internet Connection (vTIC)

Award Information
Agency: Department of Homeland Security
Branch: N/A
Contract: 70RSAT19C00000040
Agency Tracking Number: DHS SBIR-2019.OATS-19.OATS-003-0001-II
Amount: $999,972.47
Phase: Phase II
Program: SBIR
Solicitation Topic Code: 19.OATS-003
Solicitation Number: DHS SBIR-2019.OATS
Solicitation Year: 2019
Award Year: 2019
Award Start Date (Proposal Award Date): 2019-09-27
Award End Date (Contract End Date): 2021-09-26
Small Business Information
LAGUNA HILLS, CA 92653-4643
United States
DUNS: 803826465
HUBZone Owned: No
Woman Owned: No
Socially and Economically Disadvantaged: No
Principal Investigator
 Huy Nguyen
 (949) 273-5190
Business Contact
 Chieu Nguyen
Phone: (949) 273-5190
Research Institution

Metronome Software proposes the research and development of a VIRTICONN, a zero-trust system for Virtualized Trusted Internet Connections (vTIC). The effort aims to overcome the limitations of traditional network security to provide authenticated users access to private resources, typically via a VPN or TIC. This older approach increases the attack surface of an internal system as each user is represented as a user on the private network itself, leading to problems where hackers potentially have access to everything and essentially have free lateral movement. The results of the R&D program will facilitate the complete operational move to cloud deployments, as VIRTICONN provides confidence that traditionally authenticated and un-authenticated users are verified prior to granting accesses to internal cloud applications that are completely invisibility to outsiders. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach. Enterprises are turning away from past solutions that secure the perimeter and then trust everything inside and are moving to the zero-trust security model derived from R&D to protect sensitive resources and data. The potential commercial applications of the proposed R&D effort thus can be far-reaching as government and private organizations do not want to fall victim to adversaries breaking into their internal systems subsequent to successfully breaching the 'edge' security (of current protective methods) and equipped with zero-day, ransomware or other malicious methods to do damage.

* Information listed above is at the time of submission. *

US Flag An Official Website of the United States Government