BorderGuard: The Original “Zero Trust”

Share on facebook
Share on twitter
Share on linkedin
Share on email

For over two decades, Blue Ridge Network has provided zero-trust solutions to the U.S. intelligence community and the Department of Defense.

The need for government agencies and departments to be able to safely share information — highly classified information — had become painfully evident following the 9/11 terrorist attacks. At that time, Blue Ridge already had a solution that was being accredited for individual use by intelligence agencies. That solution, called BorderGuard — a core component of the company’s flagship LinkGuard system — secured the information to be shared while also segmenting it, isolating it from other parts of the network. With BorderGuard, each agency could compartmentalize, sharing only certain information without revealing what else they had that they were holding back, and from whom, which can be just as sensitive, if not more so, as the information itself. 

This ‘cloaking’ aspect was considered critical. By the early to mid 2000s, Blue Ridge technology was being used across the entire intelligence community specifically to safeguard the sharing of classified information. It was also deployed to support coalition warfare operations, protecting tactical communications in Afghanistan and elsewhere. 

Today, BorderGuard technology remains a core component of LinkGuard, a broader bucket of solutions that Blue Ridge offers to commercial customers. What BorderGuard did for the intelligence community — without a single breach ever reported — LinkGuard can do for companies that are seeking a secure way to selectively share information across different divisions and/or with partners and others they do business with.

As an added benefit, LinkGuard enables cross-domain info sharing without third-party certificate authorities. This enhances overall efficiency by eliminating the need for external infrastructure. Instead, a LinkGuard setup that includes the BorderGuard component — the only cybersecurity product of its type to do this — uses a direct peer-to-peer trust mechanism for zero-trust access verification.  

Because of the way LinkGuard is designed, each setup creates a private, custom, walled network — one that is separate from every other LinkGuard protected system. Each customer’s cryptographic identity, or key, is unique. This prevents what hackers call a “class break” — exploiting a vulnerability to get at every customer who uses that solution. This extra layer of protection has been baked into our solution since the beginning, and is another reason our system was so widely deployed by the U.S. government all those years ago.

We’ve done a lot with BorderGuard in the many years since it was first introduced. We’ve continued to develop the product, focusing our engineering work on making the product simpler to use and more flexible so that it can be customized according to the user’s needs. We’ve also lowered the costs to deploy, making it more cost-effective. With competing products, operating costs tend to be higher, mainly because those other products tend to favor a detect-and-respond approach, which eats up resources

Find out more about how LinkGuard can enable safe, effective, efficient information sharing without compromising network security by visiting BlueRidgeNetworks.com

Blue Ridge. Zero Breach for Zero Trust Network Access.