By using website you agree to our use of cookies as described in our cookie policy. Learn More


XSOC Corp. Releases Cryptographic Systems Built to Secure Critical Data

Built-in post-quantum security is designed to protect enterprise-critical data and communications.

Note: TDWI’s editors carefully choose vendor-issued press releases about new or upgraded products and services. We have edited and/or condensed this release to highlight key features but make no claims as to the accuracy of the vendor's statements.

XSOC Corp. released cybersecurity solutions aimed at providing enhanced cryptographic capabilities for existing devices in localized industrial and wireless environments.  XSOC delivers post-quantum-ready data security built to protect enterprises’ most highly sensitive data and communications from well-financed hacking groups and nation-state attackers employing increasingly sophisticated attacks. The company’s core of senior software and hardware engineers have meshed decades of algorithmic programming experience with high-performance encryption techniques. 

XSOC’s new technology addresses gaps in traditional cybersecurity systems by offering advanced encryption products, utilities, and pluggable components that are designed for the expanding Internet of Things (IoT) and Industrial Internet of Things (IIoT) markets.

XSOC Corp. is working with both the academic and professional communities to address some of the issues with public key infrastructure (PKI). SSL/TLS are generally the most-used form of PKI but offer only a “static,” certificate-based solution that, in many cases, updates cryptographic key material certificates once per year.  The certificate concept hasn’t changed or improved much in the past 20 years; it has simply become more expensive while remaining challenging to deploy and manage.  XSOC SOCKET technology is designed to enable continuous cryptographic key rotation (updates) with or without the support of SSL/TLS certificates. 

SOCKET is a cryptographic key-exchange mechanism designed for near-field/radio frequency (RF) and wireless transmissions that support hardened encryption security closed-circuit, limited-distance, or intermittent ad-hoc network environments.  Examples include securing drone-to-drone communications, tactical encrypted walkie-talkies, and other similar (battlefield) type environments that require rapid setup and tear-down. 

The technology also provides an equally stable and secure mechanism of key infrastructure for more permanent network environments.  For example, SOCKET can be used as a standalone (out-of-band) method of symmetric key transfer for legacy devices in an industrial or commercial wireless security environment, including modern streaming video cameras. 

SOCKET technology focuses on the concept of secure key exchanges in private network environments, and also is available to the internet by way of WAN-SOCKET.  The wide area network (WAN) version of SOCKET uses advanced distributed hash table (DHT) and peer-to-peer (P2P) technology to securely deliver symmetric encryption keys with minimal lag or latency.

For details, visit

TDWI Membership

Get immediate access to training discounts, video library, research, and more.

Find the right level of Membership for you.