Contact Us

(678) 235-9076

Follow Us:

Schedule Your

Time With Us!

We are always on, thinking of ways to serve you, our customers, please reach out to us using the calendar to the right, you can also find us on LinkedIn, Facebook and Twitter.

If we are busy serving other customers, we will reach out to you the next business day.

Frequently Asked Questions

Q:

Isn't it safer to select the biggest brand?

The adage is that you don't get fired for hiring the big brands. This may be true initially but the big brands are being hacked incessantly, so this approach is flawed. Big brands are big because they spend the most on advertising and have a history of success. When implementing new technology, the playing field is relatively level, with new companies entering the market daily. Sometimes we do select the large brands, other times we select the best technology that will become a large brand tomorrow. We have seen customers select the biggest brand, only to find out later that they did not have the required technology in-house.

Q:

How do I know if I am really protected?

We provide a cyber risk analysis scan before and after which correlates to the the NIST-800-53 framework and the entire Mitre attack framework, all 4,700 endpoints mapped directly to their endpoints. It is a subscription so you can continue to run it as frequently as needed, risks will show up on your dashboard. Not only does this show you what you need to fix, it will help you retain cyber insurance and reduce your premium.

Q:

Can you prove that man-in-the-middle is a threat?

I can't show you the wind but I can prove that the wind is there because of it's impact on our environment. In the same way, we read every week about cyber attacks, ransomeware and data breaches, each one more severe than the prior one. The adversaries are breaching the network, the evidence is there. This is why we begin our remediation by upgrading to a true SASE Network with Zero Trust Networking features.

Q:

If I use the tools that everyone else uses, does that make me safer?

The answer is 'Maybe'. Contrary to this line of thinking, using the big brand tools could make you more of a target because the adversaries know the make and model of the safe that they are trying to crack. For example, PCs were the favorite target for viruses because they represented 95% of the market and Macs only 5% in the 1990's. As Macs have risen to 17% of operating systems today, viruses are now being written to target them, as they are a wide enough target to be worth the effort. We do not advertise all of our tools because we want to keep the adversary guessing. If the breach is too challenging they will look for a more vulnerable target to be their next victim.

Q:

Elaborate on the Multi-path encryption orchestration and endpoint security across rotating endpoints.

NetFoundry’s Zero Trust Network-as-a-Service (ZTNaaS) architecture leverages dynamic, multipath encryption with continuous endpoint validation. Multipath means application sessions can be routed across separate, ephemeral paths— with each E2E service, as well as hop by hop connection, independently encrypted with unique keys—to minimize risk if any one path is compromised.

Endpoints authenticate using strong, cryptographic identity (e.g., mutual TLS with identity certificates) and undergo continuous posture checks. This ensures session initiation and maintenance are only allowed from trusted, compliant endpoints. All encryption and path logic is orchestrated by the fabric, using PKI, but enforced at the edge, minimizing centralized attack surfaces.

Q:

Please discuss Quantum-readiness and alignment with Nist PQC standards.

Yes, NetFoundry is actively tracking and preparing to align with NIST’s Post-Quantum Cryptography (PQC) standards. We’ve begun early-stage testing of hybrid cryptographic models (classical + post-quantum) using the NIST finalists such as CRYSTALS-Kyber and Dilithium.

Our modular crypto framework allows us to adopt new primitives without redesigning the entire fabric, and we’re targeting early adoption once NIST finalizes its recommendations.


Q:

Is there sandbox or proof-of-concept (PoC) environment availability?

Absolutely. We offer a sandbox environment designed for rapid testing and exploration of our platform capabilities. It’s a great way to validate application performance, security posture, and integration strategies in a low-risk environment.

If you're considering a pilot, we’d be happy to assist in tailoring a lightweight PoC that aligns with your infrastructure, use case, and compliance priorities. Just let us know your ideal scope and any technical constraints, and we’ll help design something practical and measurable.

Q:

Any plans for third-party validation and compliance frameworks?

Yes, NetFoundry is actively maintains alignment with leading frameworks including ISO 27001, SOC 2 Type II, and is exploring how to meet FedRAMP compliance. We also get the platform and technology pen tested yearly.


Follow Us

Follow Us

Cyberswitch Technologies is a cybersecurity firm specializing in data security, networking, cloud architecture, cloud storage, mobile apps and staffing.

Contact Us

  • (678) 235-9076

  • 3343 Peachtree Rd, NE Ste 180-1348

  • Atlanta

  • GA

  • Monday - Friday, 8:00 am - 5:00 pm

© Copyright 2025. Cyberswitch Technologies, LLC. All rights reserved.