

Use Cases
The below use cases highlight examples of how real organizations have advanced their cybersecurity with us.
01
RDP Solution Integration

Results:
✔ The company was able to strengthen its cybersecurity posture as inbound ports for RDP remain closed
✔ Network engineers were no longer required to configure the network to allow system administrator access to remote machines
✔ System administrators were able to continue to use their preferred RDP software for managing connections
✔ Savings in network engineering productivity, estimated at $75 per hour or around $150 per month per engineer
✔ Improved productivity and efficiency in RDP management
✔ Greatly improved security posture
Problem: A cloud infrastructure company’s system administrators rely on a Remote Desktop Protocol (RDP) solution to manage RDP connections but needed network engineers to configure RDP access. They wanted to continue using their familiar RDP software without disruptions but also required flexibility in managing RDP access quickly and securely.This presented challenges related to dependency on network engineers, security concerns, and the need for flexibility in managing credentials and RDP connections efficiently.
Solution: A cloud infrastructure company chose Xiid’s SealedTunnelTM for RDP connection management. A system administrator installed and directed RDPconnections to Xiid’s SealedTunnel loopback addresses. This enabled the system administrator to connect to remote machines using their preferred RDP solution, leveraging credential storage (if not using Xiid RDP Agent) and maintaining a familiar user experience. The SealedTunnel ensured that the RDP connections were secure, providing a reliable and efficient solution for remote access to machines.

02
Secure Web Service Access
Problem: A cloud infrastructure company that provides web-based services to its customers wasfacing a challenge with its network configuration process where some current and potential customers were unable to access web portals hosted on the company’s virtual machines due to closed ports on their network. This resulted in a time-consuming and inefficient process where the company’s network engineers needed to manually configure network settings for each customer to allow web service access. Moreover, this process raised concerns about potential security risks associated with open inbound web traffic ports and attack vectors related to web services, which could compromise the security of the company’s systems and customer data.
Solution: The cloud infrastructure company deployed Xiid’s Identity and Access Management (IAM) solution on their domain controller. This has allowed them to manage authentication and access control for their customers in a centralized and secure manner. By using Xiid’s ZeroKnowledge Networking suite, the company:
✔ Deployed SealedTunnelTM, a secure communication tool, on their web server VirtualMachines (VM)
✔ Created a dedicated Xiid-hosted SSO Portal for each customer to easily and securely access their resources
✔ Implemented a card in each customer’s SSO Portal. This allows customers to securely access their web service with a single click. With no open ports or special network configurations needed on the VM, customers who’ve installed the SealedTunnel software on their client machine simply click a card in the Xiid-hosted SSO Portal to instantly and securely access their web portal.
Results
As a result of implementing Xiid Zero Knowledge Networking, the company has:
✔ Eliminated the need for public IP provisioning
✔ Tightened security restrictions
✔ Gained seamless and stable access for its customers
✔ Saved money on public IP Addresses and network engineering Work
✔ Dramatically improved the user experience
✔ Ensured the highest level of network security

Results:
The capabilities, within the MCLZ, combined with local cloud adjacent storage, leveraging the Equinix ecosystem, will address the following challenges:
✔ Single data governance approach, processing data without moving the data.
✔ Full visibility of network interconnects between CSPs and other mission partners.
✔Inflight encryption solution minimizing attack vectors via multi-tunnel, quantum resistantalgorithms.
✔Cloud Orchestration + FinOps tracking monthly financial investment with real-time adjustments& recommendations.
✔Single process for containerized orchestration and management between hyperscalers.
​
​
03
Secure Multi-Domain Landing Zone
Problem: With the need for real-time data analysis, visibility and options to store data in the most efficient manner possible, data must be available, shareable, and formatted to move between on-premises and multi-cloud data stores. This level of efficiency is limited today. Although there is a need to leverage the capabilities
across cloud service providers (CSPs) this task has been difficult due to the financial burden in respect to storage, movement and processing within a multi-cloud model.
Each CSP distributes their services differently, therefore agencies have established dedicated teams as subject matter experts (SME) for each. This support model has elevated costs and stifled the
scale and flexibility required today.
Solution: The multi-cloud landing zone (MCLZ) is the single
point of presence, for direct connectivity to any CSP. The pivot point is and will continue to be focused on the data. This includes how the data is obtained, stored and processed for availability at the speed of mission. The evolution of the cloud has provided elevated opportunities to do more with less as we defer to the major CSPs to offload the burden associated with these multi-processing actions. Although the framework is there, the reality is that the multi-cloud vision has become financially unattainable. The escalating financial responsibility continues to be a headwind in respect to taking full advantage of the capabilities that a multi-cloud deployment offers.
​