Its About

Premiere Cybersecurity

History

Founded in 2017, Endpoint Security Inc holds an exclusive license to technology created at the University of Notre Dame for employing polarization methodologies for cybersecurity. It is focused on bringing this powerful technology to market. The company has received awards which include the Grand Prize at OilComm in its prestigious Startup Space competition. Another First Place award came from Tech Brief’s (formerly NASA Tech Briefs) international Create the Future Design Contest. Endpoint’s CEO served as the keynote speaker for a global conference on Deep Tech Startups held in Saudi Arabia and has been invited to speak at the IEEE Future Technologies Conference.

 
 

Get in touch

We would love to talk with you.

Send us your questions ▸

 
poincare_w_free_fingerprint.png

polarization

What is it?

Polarization describes the orientation of a signal being transmitted from a source to a destination. It is best understood in the field of optical communications. In optical fiber, polarization can be affected by non-uniform characteristics which cause birefringence that delays the propagation of light differently in one orientation over another. This can happen, for instance, when a fiber is extruded in a way that causes the core to be oval, rather than circular in cross section. In the RF world, the same phenomenon occurs when a wireless signal reflects off of a material with a different dielectric constant. In both cases, the altering effects are called polarization mode dispersion.

 

The amazing thing

Here’s the amazing thing. The polarization mode dispersion is frequency dependent. This means wireless signals are altered differently for different frequencies. So, a signal sent in a band of frequencies, which covers most wireless communications, presents a line segment defining the changing angles for each frequency in the band. Through patented technology, this may be used as a fingerprint for any wireless device.

The impact

With a stable fingerprint for every wireless device, one can protect all fixed wireless devices just by passively looking for the naturally occurring fingerprint in the signal. This can be done at the input of an access point, in parallel with its normal demodulation circuitry. Bu the time the access point has completed demodulating the incoming packet, Endpoint technology has the answer to its authenticity.

 
 
 

 
 
 
WIPS generic.png

application

What does it replace?

Nothing. The technology may be employed in parallel with existing security mechanisms. For sensors in which there is no security software, Endpoint technology becomes its primary protection. For devices with sophisticated security software, Endpoint technology adds a layer of security that is done in parallel. Endpoint technology adds no latency while providing superior cybersecurity.

Whatever your current access point provides as security is unaffected by the addition of Endpoint technology. Other than the ability gained to authenticate the devices you want to communicate with, the operation is completely hands off.

For artificial intelligence cybersecurity applications, Endpoint technology offers a new data point of information on persistent attempts from an unknown source to access the network. This information is often obscured by the attacker using a known MAC address, password and encryption key learned from sniffing wireless signals. But, no more. Endpoint Security has the solution to this elusive attack.

 
 
 

 
 
dreamstime_xs_95928907 hacker.jpg

benefit

Peace of mind

Stop chasing the perpetrator! We chase the perpetrator when we rely on software solutions that recognize attacks. We constantly update our databases of known attacks. We write software for the edge devices. But, with software comes vulnerability and when the attacker learns the new vulnerabilities, what do we do? We write more software, continuing the cycle. It is time to get out in front of the perpetrator; stop them from entering the network in the first place. Endpoint technology is the way to do just that.

 
 

Who We Are

 

Page Heller

page heller, ceo, is a professional engineer in electrical engineering and began his career designing custom industrial control systems, as Micon Engineering, for his customers: ABB, Schumberger Industries, Pirelli and NASA. He is a Certified Licensing Professional. He has founded a number of companies.

Bob Moore

bob moore, cfo, served as managing director of Donaldson, Lufkin, Jenrette and later as managing director and cfo for IPXI, LLC. While in these positions, he worked with communications technology companies across the globe in valuing and licensing telecommunications technologies relating to 802.11x. 

Jay Labhart

jay labhart, coo, served as the Senior Director of Cybersecurity (IOT, Industrial Internet, Cloud) within GE’s Chief Engineers Office. Led world-wide design sites focused on building complex products and industrial control solutions for the Energy sector.  Proven track record building and deploying industrial security solutions in the Oil & Gas market.  Previous experience leading computer technology startup through acquisition

 
 

“What this world consists of, we cannot say or conjecture; we can only conjecture what it seems, or might seem to be, to minds not too different from ours.”

— Henri Poincaré