Q. WHAT IS THE IRON JACKET?™
A. THE IRON JACKET ™ is the only active, real time threat detection and elimination system on the planet. This Cyber Security software is currently the ONLY top line defense that may help you protect your business from yet another threat… the FTC. To understand how the FTC can take your business down for failure to use “Best Practices” please read our Blog posting from October 20, 2015. The Need for Great Web Security Just Escalated! If that does not scare you, have someone check your pulse!
THE IRON JACKET ™ is a unique Web security software that will eliminate the kind of intrusions recently endured by Anthem BC/BS, J.P. Morgan Chase Bank, Home Depot, Target, Subway, Adobe, Ebay, Sony and so many more. The software is designed to be very unfriendly to NSA and other potential threats. Further, our MEDUSA™ spam and spy bot assassin adds a layer of security beyond anything one might imagine. Bottom Line: Messing with THE IRON JACKET™ is like French-kissing an Ebola patient.
Q. WHY IS YOUR WEBSITE SO PLAIN, TO THE POINT AND WITHOUT A LOT OF “EYE CANDY?”
A. This Website is designed as a basic introduction page for Business Executives and Web / IT Administrators. We recognize these folks are busy and need to get basic information quickly and easily. By utilizing our secure, internal IRON DOC’S Webmail, they can request one-on-one conversation with a live, English-speaking and professional IRON JACKET Agent. Because protection and installation requirements are so varied, our customer service is designed to simplify and streamline the application, sign-up and installation process. Further, providing more information on how the system works is counter-productive to our Top Secret security features.
Q. DOES THE IRON JACKET™ HELP WITH HIPAA AND OTHER “SECURE OR BEST PRACTICES” REQUIREMENTS?
A. YES. In addition to HIPAA compliance requirements, THE IRON JACKET™ Web Security Library helps subscribers meet and exceed all published Web Security requirements for: COPPA, FINRA, and FERPA. Although Safe-harbor/EU has been suspended, our systems exceed their previously posted requirements.
Q. YOU ADVERTISE THAT THE IRON JACKET™ IS NSA PROOF. IS THAT POSSIBLE AND IS IT LEGAL?
A. YES on both. counts. It would take anyone, including NSA, the next trillion years, using all the computers ever built and that will be built in the next billion years to get a one-tenth of one-thousdandth of a percentage chance to break our system. This is entirely legal because the right to do so is guaranteed by the United States Constitution.
Q. IS THIS KIND OF PRIVACY MORAL AND ETHICAL?
A. YES, it most certainly is, as long as it it used in a moral and ethical manner. Everyone has a reasonable and virtuous right to privacy. We consider our unique position to be a great blessing with an equally greater responsibility to treat it and use it with the utmost respect and responsibility. In that regard, we do not do business with anyone that does not meet our strict application requirements. Acquisition of a subscription is by invitation and only after our authorized application is reviewed and approved.
THE IRON JACKET™ reserves the right to refuse or withdraw service from users deemed as high risk, inappropriate, illegal in any fashion or as a potential National Security threat. If your Website is utilized to facilitate any of the above-mentioned illicit activities, DO NOT waste our time with an application for service. We are not a shelter for crime or inappropriate content of any kind.
Q. HOW DOES THE IRON JACKET™ WORK?
A. The IRON JACKET™ is a software program designed to work within the existing Website Firewall; it is NOT a replacement for existing firewall protection and/or a cover for cavalier security practices. If an intruder finds a way into a Website containing THE IRON JACKET™, the intruder is greeted by our exclusive, passive and dynamic, Triple Threat Protection. Our *GSR taints, identifies and tracks the intruder. The *HONEY JAR, which contains the “search and destroy” function, is activated and an alarm is sent to the administrator. *MEDUSA™ Form Protection is also awakened and working in conjunction with the other elements the intruder is pursued and destroyed after being trapped by our 256 bit cascading encryption. GSR, HONEY JAR, and MEDUSA™ are further explained below. Beyond this general explanation, our coding is Top Secret.
*How these independent elements combine and work together to ultimately vanquish intrusion attempts is classified, proprietary information.
Q. HACKERS ARE WORKING FEVERISHLY TO CREATE NEW THREATS. WHAT ARE YOU DOING TO COMBAT THAT?
A. We are continually monitoring the deep cyber community while also conducting routine tests on our systems. Updates are made continually and sent to existing systems via cypher pad encryption.
Q. I AM GETTING THE IDEA THAT THE IRON JACKET ™ IS DIFFERENT FROM ANY OTHER CYBER PROTECTION; IS THAT TRUE?
A. Yes, we are very different. Our approach to cyber security has put us at the forefront of this important arena. How we identify, treat and repel intruders is unique. While we cultivate respect for the depth and efficiency of our security products, the dawn of fear is also rising on the hacker community. Is the hunter now doomed to become the hunted?
Q. WHAT IS CASCADING ENCRYPTION?
A. If the IRON JACKET™ detects an intrusion attempt, data being transferred is re-encrypted… over and over like a series of waterfalls dropping like Dominos, as needed to confuse, elude and deny the intrusion. This is rarely needed, but in the case it may be put in play, the intruder is lead deeper into potential obscurity.
Q. WHAT DOES GSR REFER TO?
A. GSR stands for “Gun Shot Residue.” Just as a person firing a gun has microscopic gunpowder residue splattered all over the hand and arm of the gun holder, an intruder trying to hack a site protected by THE IRON JACKET™ will be tainted with our cyber GSR while the system sends a potential threat notification to the site administrator. Simultaneously, the system elements are triggered into an orchestrated threat mitigation mode.
Q. WHAT IS THE HONEY JAR AND WHAT DOES IT DO?
A. The HONEY JAR works independently and yet simultaneously with the other active elements of The IRON JACKET™. The end result being subsequent and sequentially lethal consequences for intrusion attempts. Think of a bear trap on steroids.
Q. WHAT IS MEDUSA?
A. Like her namesake, MEDUSA™ is a force to fear. Some intruders are cyber robots, referred to as bots, sent to spy on data or collect email information and return it to a collector who then sells the stolen booty to others who exploit it for financial profit. MEDUSA™ essentially makes eye-to-eye contact with the bot, immediately turning the bot into impotent stone. How she actually does this and the implementation of the far-reaching lethal effects of her gaze are proprietary and classified. Potential hackers should be aware; MEDUSA™ is not something to mess with.
Q. YOUR LOGO LOOKS LIKE AN ERASER, IS THAT CORRECT?
A. Yes. The ERASER represents an implied message to potential hackers. Let your imagination go to work here. THE IRON JACKET™ is not just passive protection*. We have an aggressive, “Don’t mess with us” policy.
Q. HOW MUCH WILL IT COST ME TO HAVE THIS PROTECTION?
A. All annual subscription pricing is based upon combined bandwidth and CPU requirements in addition to several other factors. The most basic coverage starts at affordable rates for a minimum, annual subscription. This is solid peace of mind when compared to the alternative. Please refer to the pricing tab for a link to learn more, including how we work with qualified non-profit companies and services.
Q. SOME OF YOUR PROCEDURES SEEM A BIT CUMBERSOME AND OVERLY DETAILED. WHY?
A. Security and efficiency are of prime importance to us. We operate on a mantra of “Do It Right and Do It Now.” While we do not drag things out, we do take time to make sure things are as right as we can make them before moving forward. At the risk of offending some readers, if our careful attention to detail is burdensome to you, then why are you reading this report? If you are looking for a quick fix, you can probably find it elsewhere and pay a much higher price later. While trying to save time and money on some things is good business, short cuts and cheap fixes in the world of Cyber Security are train-wrecks waiting to happen. Please read our Blog for more information.
Q. IS IT DIFFICULT TO INSTALL THE IRON JACKET™?
A. No, after setup and installation preparations, the general installation is very quick and seamless. The basic levels for smaller site applications are of similar procedure. Larger, customized subscriptions are installed by our technicians working with the IT department of the subscriber. Following installation, 24/7 live support is available for all subscribers on a private line. On the other hand, if your Network/Web interface is not at top level security efficiency, corrections and preparation for The Iron Jacket™ may take some time and additional expense. With the exception of smaller business sites hosted on our servers, all other installations are fully customized. We are staffed with a variety of professional IT and Web Security Agents who know how to bring your system to the levels required for ‘Best Practices” proficiency.
Q. WILL INSTALLATION AFFECT THE FUNCTION OF MY WEBSITE?
A. No. Because the actual installation is very quick and seamless, there is no discernable affect on site function. Further, we encourage installation late at night and on weekends to mitigate any potential disturbance. When you purchase your subscription, your support agent will help you determine the best time for your business. After installation, your site will function as normal with one exception; you and your customers will have peace of mind, knowing that you have this extra layer of profound protection.
Q. WHAT IF I HAVE DIFFICULTY WITH THE INSTALLATION?
A. Including all smaller business sites hosted on our servers, either shared or dedicated, all installations are fully customized. The custom installation process is performed with one of our technical specialists in collaboration with your IT manager. Meeting all of the posted, pre-installation requirements before the start of installation should provide a quick, clean installation. Thereafter, the system should function quietly in the background. However, we recognize that Websites are like snowflakes with no two being exactly alike. That in mind we provide 24/7, live support, in English, from our Denver-based support staff.
Q. ARE HACKER ATTEMPTS IDENTIFIED AND WHAT HAPPENS THEN?
A. Yes. The software has a built in notification that alerts the Administrative Web Master. In basic subscription service, the Web Master would then call our tech support for assistance and analysis of the threat. Advanced services have an automatic notification to our resource center. Further, you have the option of hosting your Website with the Computer Services division of our parent company and utilizing a bundle package that includes THE IRON JACKET™ and complete Web Management. Please send us an email query with contact information and we will respond immediately.
Q. If I DON’T HAVE A WEB MASTER, WHAT OPTIONS ARE AVAILABLE FOR HELP?
A. If you don’t have a Web savvy administrator, we have a variety of ways to help you bring your Website to the highest levels of Cyber Security. Contact us for more information. Additional annual subscription fees for unaffiliated system monitoring are quoted by system size. Please contact us for details on customizing your IRON JACKET™ Web Security Suite.
A more secure, time and cost-effective option would be to consider a Web management bundle with complete hosting, page update and design, security and monitoring services. Note that the bundle service is currently only available to a limited number of small business accounts and are sold on a first come basis. You may sign up to be notified when the service is expanded to meet the needs of larger operational requirements. Please send us an email query with your contact information and we will respond immediately.
Q. WHAT OTHER PRODUCTS OR SERVICES DO YOU OFFER?
A. We recently launched IJ Hosting and Shared Hosting which makes access to all of the protection provided by THE IRON JACKET™ easy and very affordable to any business Website. Contact us for more information.
We have also recently added a free TOOL page that currently boasts a very cool, and free, password generator. Passgen™ is our own creation that will baffle you with the low probability of these passwords ever being compromised.
Q. DOES THE IRON JACKET™ SCAN FOR VIRUSES?
A. THE IRON JACKET™ Web Security system is on alert for any type of adverse intrusion and deals with each one accordingly on the Web server to which it is assigned only. Visitors to Websites protected by THE IRON JACKET™ are safer and less likely to pick up a virus or malware from that site because it is clean. Individual /network computers are not protected. You should have an anti -virus software package installed on your computer network along with an updated firewall. THE IRON JACKET™ Firewall is in production and will be available soon.
A problem stems from the fact that other sites not protected by our system may be an unwilling or nefariously and covertly designed source of infection for any visitor. Because our system does not perform outside its assigned location, all Internet users should have one of the popular and proven anti viral-/anti malware protection kits installed on their computer network. Additionally, users of the Internet are encouraged to be careful of what sites they choose to visit. Indiscriminate surfing is very risky.
THE IRON JACKET™ is not designed for use with individual computing hardware. We encourage all Internet users to be knowledgeable about safe computer use and surfing practices, not the least of which is carefully monitoring usage by children. Please visit our Blog for tips on how to secure your personal computer.
Q. DOES THE IRON JACKET™ PREVENT COOKIES FROM BEING INSTALLED ON MY COMPUTER?
A. NO. Our system is not designed to work with individual computers at this time. The majority of cookies are harmless and are actually very necessary for optimal performance of your use of the Websites you visit, including our sites. Cookies placed by many Websites actually provide a layer of security during the “handshake” process when you log in to your established Web accounts. If you want to control cookies, go to the preferences section of your browser where you have several options. Choose the options that are right for your usage. Be aware that some options may severely limit and downgrade the quality of your Internet use. Further, improper preference or operating settings are the source of a large number of problematic computer performance issues.
Q. RAIDIAN™ GLOBAL, INC. SEEMS TO BE MULTI-FACETED BUT WITH AN ORIGINAL EMPHASIS ON FILM PRODUCTION. HOW DID YOU COME TO BE AT THE FOREFRONT OF WEB SECURITY AND FILE SHARING SOFTWARE?
A. The world is driven by the simple fact that necessity is the mother of invention. After not finding what he needed for use in film production on the open market, founder J.R. Hildebrand decided we needed to grab the bull by the horns and make our own software to meet our specific needs. It was immediately recognized that these products have much broader application and usefulness beyond the film industry. Please read our History page. It has been a wild rollercoaster ride… and we are excited for the future. Check out our employment opportunities.
“We ERASE Hackers!”
HIPAA Compliant Web Security.
© 2015-2017 THE IRON JACKET,™ LLC
& RAIDIAN™ Global, Inc.
Our servers are protected by THE IRON JACKET™