STAY UP TO DATE
HyperQube to use funds to meet immense demand for simplified and automated web-browser based virtualization services.
Washington, D.C., May 8, 2019 – HyperQube, a web browser-based digitization and virtualization provider, has raised a round of seed funding for $500,000. Investors include: Adam Ghetti, CEO, Ionic Security; Michael Wellman, CEO, Virgil Security; Dmitry Dain, CTO, Virgil; MACH37 cybersecurity accelerator; the Center for Innovative Technology (CIT) Gap Fund; and local investor Kathryn Stewart. The company is using the funds to accelerate sales and development and add key hires to the executive team.
HyperQube is tackling the lacking or broken existing solutions for virtual infrastructure development by offering enterprises the ability to quickly and easily build an exact copy of any IT infrastructure. These virtualized test environments can be built in minutes and easily modified, re-used and shared. To accommodate the increasingly cloud-based enterprise, HyperQube unifies the distributed virtual infrastructure ecosystem by radically simplifying and automating the way it is created, distributed, consumed, and stored.
“We are thrilled to have gained the partners and funding that will allow us to meet demand, grow faster and welcome top-grade talent to the executive team,” said HyperQube founder and CEO Craig Stevenson. “Our initial launch proved what we knew to be true from the beginning: There is intensive need from enterprises and government for better tools to create, develop and distribute virtual infrastructures.”
HyperQube has developed personalized products for a variety of C-suite needs and use cases. These solutions include: HyperRange for enterprise to virtual infrastructure development and deployment, HyperDesign for remote collaboration and HyperSkill for realistic cybersecurity education and training. Learn more at www.hyperqube.io.
HyperQube technology enables enterprises to quickly and easily build an exact copy of any IT infrastructure. HyperQube virtualized test environments can be built in minutes and just as easily modified, re-used and shared. Learn more at www.hyperqube.io
HyperQube’s virtualized network offers a new approach that will disrupt enterprise network security, development & scaling for both small and large organizations.
Washington, D.C., March 4, 2019 – Over the weekend HyperQube announced the launch of its service offerings at the Northern Virginia Security Conference BSidesNOVA.
HyperQube offers enterprises, small businesses and academic institutions the ability to quickly and easily build an exact copy of any IT infrastructure. These virtualized test environments can be built in minutes and easily modified, re-used and shared. By providing a “cyber range as a service,” HyperQube enables technologists the ability to look to the future and explore infrastructures in a risk-free environment.
“HyperQube recognized the growing need for a scalable and reusable virtualized environment to test network boundaries,” said HyperQube founder and CEO Craig Stevenson. “It’s exciting to see our partners explore the limits of all that our software can provide from superior security hygiene to speedy network-wide update deployment.”
With more than a decade of corporate cybersecurity research, development and curriculum building experience, Stevenson was intimately familiar with the shortcomings of virtual machine software and the headache of making even simple changes to a virtual environment. HyperQube technology vastly improves upon traditional solutions in key areas:
- Reduces labor associated with managing both virtual machines and software defined networking by 90%;
- Eliminates the need for expensive hardware;
- Builds test environments in minutes, not weeks;
- Bridges any environment to the physical infrastructure
to integrate devices which can’t be virtualized
HyperQube partners with Cisco for testing and deployment needs across the enterprise and Forrester to provide virtual infrastructures for the company’s build out of Zero Trust deployment demonstrations. HyperQube also hosted an international Capture The Flag (CTF) hacking competition with participants including Massachusetts Institute of Technology, Oxford University, and Harvard University.
The company, a graduate of the Mach37 cybersecurity accelerator, joins a budding trend of DC area home-grown, high potential startups.
On November 1,
Our infrastructure held up – performed beautifully – but we learned several valuable lessons, which I want to share.
Lesson #1: Encourage good behavior
If you have over 150 hackers participate in a CTF exercise, the first thing they are going to do is try to break the platform which is hosting the CTF. We had several hackers break the platform so instead of immediately banning them and kicking them out of the competition, we asked them how they did so we could fix the problem. The reaction we got was incredible. They wrote detailed explanations of how their exploits worked and even offered suggestions on how we could fix the problems.
Lesson #2: UUID is your friend
One of the easiest ways to try and hack a web app is to access try and access a URL the developer had not intended. We use the python web framework Django. There is a particular Django design pattern that can let users guess a URL they shouldn’t have access to. That pattern is as follows:
Where “exercise” is the type of an object and “207” is the unique id of the object in the database. But if that URL works, it is easy to guess that a valid URL might also be,
So instead of using the default Django primary key for the object, use a UUID instead. For example:
id = models.UUIDField(primary_key=True, default=uuid.uuid4, editable=False)
This will result in a URL that is borderline impossible to guess:
Founder and CEO of HyperQube Craig Stevenson in Tokyo announcing the winners of the INCS-CoE Capture the Flag Competition, sponsored by Sasakawa USA
Lesson #3: Learn From Your Users
If you pay attention to your users, they may surprise you with their imagination. By giving users complete freedom, we were encouraging them to use creativity to hack into machines. We were not disappointed. By instrumenting the environments, we have the ability to record and playback the hacks our user used. The administrators become the students – and we’ll be better off because of that.
Launching in Q1 of next year we will be offering access to our database of live hacks. If you are an AI or Machine Learning startup who needs access to a dataset, get in touch with us.