How to Avoid the ‘Mousetrap Syndrome’ of Network Security


How do we protect our data?

It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams.

We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like trying to keep mice out of the home, the struggle to fend off malicious attacks against networks is a never-ending battle.

In Silicon Valley and beyond, brilliant minds in digital security compete constantly to iterate designs — to essentially build a better mousetrap.

We’ve built mousetraps that are:

  • More intelligent
  • More alert
  • Faster, and simpler to use
  • Even some that can be controlled in real time, directly from a smart phone when you’re away

We have developed VLANs, firewalls, prioritization, ACLs, and many other traps to prevent the mice from getting in and leaving with our data. Yet still we see, time and time again, they find ways around our elaborate traps.

In the first half of 2017 alone, there were a recorded 918 breach incidents, combining to a total of 1,901,866,611 records breached. This represents a 13% increase in breaches from the last six months of 2016.

The problem is as we mentioned before: Iteration.

While we have continued to tirelessly work to improve old mousetraps, the mice are catching up, getting smarter, and growing in numbers. And the number of breaches per year is increasing at a staggering rate. The amount of actual innovation we’ve seen — paradigm-shifting, quantum leaps forward in the way we approach network security — has been alarmingly small.

Perhaps the goal should be: think outside the mousetrap.

Here at HOPZERO we think we’ve found a better way to keep that mouse out of your home. Make it expire before it has a chance to dig past your traps.

We don’t do it with traditional traps or poisons. Imagine it more like forcing the mouse to get old and die of natural causes…really, really quickly. That would be difficult with actual mice, but it’s possible with data and connections.


Imagine if all the cheese in your refrigerator were expiring today. It would be difficult to steal because, as soon as you take it out of the fridge, it’s gone bad. In a sense, this is one of the ways the HOPsphere Radius Security works. It prevents data from moving more than a predefined distance from the server without the connection expiring.

In more technical terms, the technology uses IP to define a perimeter of TTL/HOP (time to live/hop count). HOPsphere Radius Security can analyze hop count and use that information to limit the lifespan of a data packet. It learns by analyzing every packet that traverses the network.

Once we learn where data needs to go, we can adjust the hop count to only allow travel within the allowed perimeter. Any sessions extending beyond that perimeter are terminated and new connections are blocked.

If you have your ear to the ground at all in tech and network security, you know these are trying times. Our world’s data is more vulnerable than ever, and we are in need of something new to defend the privacy and data of people and organizations. HOPZERO is answering the call — not with a new mousetrap, but with a solution we believe is truly innovative.

If you’re interested in learning more, we’d love to speak with you

Tags: Hop Value
<a href="" target="_self">Jim Rounsville</a>

Jim Rounsville

Network Management Corp CEO, large-scale network services, data center design, critical infrastructure security.

Jim Rounsville

Network Management Corp CEO, large-scale network services, data center design, critical infrastructure security.

Read More

Distance Per Network Hop Technical Report

Distance Per Network Hop Technical Report

This is a technical data analysis of physical distance per network hop done for Hopzero.Peter Mullarkey, PhD, Hopzero and RedRunGroupVersion 2.0 Motivation Having a basic understanding of the physical distance between network hops can provide insight to a company’s...

Keeping Data on a Short Leash to Avoid Breaches

Keeping Data on a Short Leash to Avoid Breaches

Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise? Another dog? Dogs...