Nate: This is mainly speaking to a lot of the values that we talked about in the presentation here. Because if you try to take it from a traditional perspective, and say, "We need a robust security environment," there's going to be a lot of networking changes you have to make to make that happen, both in the immediate, just to make sure your network is initially secure for your operations team, but also ongoing.
As IPv6, say, comes in more into play, or you need to have different site-to-site connectivity options with different protocols, all that requires constant updates to your network, and might require even different networking solutions over time. You might start with one VPN option, but then you decide you need to add some OSPF or BGP routing, to kind of share the different IP stacks and networks from each site together, to help with providing that seamless operations efficiency for your team.
With Atsign, that becomes a bit of a point you don't have to think about anymore with IP networking and site-to-site, you know, kind of network sharing because, each device that you're trying to access for that operations team becomes an atSign. It just becomes an ID that you can then say, "I need to connect to this particular device.” I don't need to know how to get to it, because the device is building an outbound connection between itself and me directly, as a secure, end-to-end encrypted tunnel. So, there's no overhead with having to know how to route back to each site, or how to route back to each equipment, piece of infrastructure. And that's the main benefit that we're highlighting here.
Colin: Building on that, Nate, I would say traditionally, we've overlaid networks. And we've put more IP networks over top of IP networks, like VPNs and tunnels and all the rest of it. And that has worked very effectively, but if you're having to manage those, and worry about them, it's another network to worry about, so you're putting even more workload on your security, so now you have an overlay network, and you've got to manage that as well as the existing IP network that you're using. The Atsign approach is not that. We're not creating overlays. You're at the bottom of the stack, with individual sockets and ports. Now, you can do whatever you want over that, but you're not creating a whole new network. You're just getting connectivity for the smallest thing that you need to do, which is, you know, generally a good security stance. So, that's how you balance it. You have connectivity, but without any attack surface, and you make sure that everything's end-to-end encrypted, but you don't put more burdens on your network staff. You know, it's enough to tackle one network, let alone having overlay networks.