The Simple Solution for Network Security

What We Do

Cyber Attack

Our system works in real-time. We currently encrypt and network IEC 61850 protocols in less than 0.07 milliseconds. We will NEVER bottleneck your system

Cyber Attack

Kloch uses a patent pending key management system. We do not send any key generation data ever. We operate outside the limitations of "true" synch

Cyber Attack

Kloch is hardware based. We are OS indifferent. We reduce the challenges of system updates

Cyber Attack

Kloch is a patented Variable Word Length encryption running at the binary level. It is ever-changing with over 10^512 Possible combinations

Cyber Attack

Our Encryption method has minimal energy consumption and thermal radiation. Contact us for more details on how energy efficient our hardware is

Cyber Attack

Kloch is equipment agnostic. Anything that works with TCP/IP protocol will be protected; Legacy Controls, HMI’s, DCS, RTU and Network Switches

Kloch uses a patented non-algebraic encryption system. Our encryption works with any digital file type, and runs seamlessly with any TCP/IP system.

"You've got to try to figure out how to build something that is secure against technology in the next century that you cannot even imagine."

– Whitfield Diffie

Our Team

Cyber Attack

John Downing

Product Delivery

Cyber Attack

Bryan Kane

Founder - Operations

Cyber Attack

Brian Penny

Founder - Products

Sending your message....