Does VTE use PKI, TLS or SSL?
No. VTE uses a dynamic key generation technology that does not exchange or store security keys.
What is main difference between VTE and other security technologies or protocols?
VTE is distinguished from other protocols in that unlike all other protocols,
VTE does not require keys to be exchanged across networks or the internet. VTE AES
Certified keys are not stored on local or server drives. Keys never exist in the data pathway.
If VTE does not share or store keys, how do the sender and recipient get the keys to open encrypted information?
The VTE innovation dynamically creates on demand keys at the origin and destination when required. The technology does not use existing PKI or Diffie-Hellman key exchange algorithms. Instead an entirely new approach to key generation eliminates the need to share, distribute or store keys.
How does encrypted information get to the right person?
VTE does not affect normal authentication for server access. Message and information are routed as normal. VTE simply eliminates the transfer or distribution of keys. Again, messages are routed as normal, unrelated to the VTE process.
Why is VTE more secure than conventional protocols?
VTE removes the encryption keys from the data pathway and from storage drives. Keys are simply not physically present to be stolen. Without the encryption key,
NIST.gov estimates that a brute force attack on an encrypted file will require 10^55 years (1 followed by 55 zeroes) to be opened if the key is not available.
How is it possible to use keys at two different locations without ever exchanging the keys?
This is the proprietary VTE innovation. It is not a trivial re-arrangement of existing protocols. It is an entirely new approach to key generation.
What is the most important advantage of using VTE?
VTE enhances all protocols because it is designed to run within existing pipelines while improving them. In addition, because keys are not transferred or stored, key management overhead is eliminated, improving hand-shaking and overall transmission.
Is VTE difficult to install?
VTE is provided in the form of .msi files that install quickly (1 minute or less). As noted above, it runs within existing pipelines and requires no special data protocol configuration.
Does VTE require special hardware?
Depending on the type of configuration requested, clients can choose shared, dedicated or private VTE services. Private installations involve hardware that is provided to the client.
Who uses VTE technology?
VTE is for enterprise or corporations, where the demand for security is highest.