DxOdyssey & DxConnect: Security Software for Zero Trust Connectivity
DH2i’s SDP technology virtually eliminates your lateral network attack surface while connecting users, sites, clouds and devices
Unparalleled networking security
Strengthens your Zero Trust architecture by permitting users to access only authorized apps, not a slice of the network—eliminating the ability for any lateral movement. Data flows directly between remote users, sites and clouds using application-level DTLS encrypted micro-tunnels and Public Key Authentication.
Configuration and management simplicity
Simply install and connect within seconds. This lightweight software integrates into any existing networking infrastructure without appliances or VPNs to install, configure, or maintain, meaning no ACL or firewall configuration headaches.
Highest levels of performance
Tunnels can be configured between gateways on any commodity hardware. Remote users can install DxConnect, a lightweight app, to access tunnels from anywhere. Tunnels can also be made redundant and highly available with built-in failover all without requiring DNS resolution. DxOdyssey can even integrate with applications such as SQL Server Availability Groups.
Our lightweight Vhosts decouple enterprise applications and stateful Docker containers from the underlying IT infrastructure. Smart Availability provides workload portability from any host, to any host, anywhere—with total assurance that your workloads will be intelligently allocated to optimize cluster resources.
Simple-to-implement HA & DR
You can go from standalone to clustered in minutes, and get all the advantages of intelligent, self-healing high availability and disaster resilience with multi-subnet failover.
You get under 60-second RTO (planned or unplanned) and protection from infrastructure, OS and application faults—even pilot error. The result? Unprecedented SLA assurance with application-based QoS.
Our SDP tunneling software connects remote users, on-premises sites and/or multi-cloud environments with application-level micro-tunnels to support a Zero Trust architecture
Our Vhost technology decouples applications and containers from the OS/IT infrastructure while providing a persistent and consistent view to your data
WSFC is Dumb: Get Smart About Clustering
Join DH2i on August 7th at 2pm ET to learn about the quickest, most effective way to escape WSFC oppression in your environment. You’ll be introduced to a clustering alternative that is much simpler to manage.
Sign up here for a 30-day free trial of any of our software to see how our solutions can optimize your environment.