Skip to Content

Next-Gen LEO Satellites & Subsea Networks – Placeholder

Copy & blurb need replacing once white paper is finalised. This is currently from Security blog/white paper.

The digital world is under siege. Hackers, organized crime, and rogue nation-states relentlessly probe for vulnerabilities, exploiting any weakness to compromise sensitive data. The 2020 Solarwinds attack, a sophisticated supply chain breach, exposed the fragility of conventional network defenses and underscored the urgency of fundamentally changing how organizations secure and control their data.

If the best-prepared and best-equipped organizations in the world can fall prey to these attacks, how can others hope to defend themselves using the same vulnerable infrastructure?

Advanced Capabilities for Enhanced Security

  • Quantum-Proof Encryption: All data is encrypted at rest and in transit with algorithms designed to withstand future quantum threats
  • Zero Trust Network Access: Only authenticated and authorized devices and users can interact with the network
  • Carrier Ethernet Backbone: Enables telco and enterprise customers to deploy Outernet as an extension of their own networks, with familiar interfaces and management models
  • End-to-End Custody: Because the entire network is controlled by a single operator, chain-of custody is preserved from origin to destination

Introducing The Outernet: A User-First Private Network in Space
  • Gateway-less Design: Data flows directly from user terminal to user terminal, eliminating teleports, POPs, and meet-me points that introduce delay and security risk
  • Optical Inter-Satellite Links (ISLs): Create a true orbital mesh, enabling rooftop-to-rooftop communication across the globe without relying on terrestrial infrastructure
  • Mplify-Compliant Carrier Ethernet: Offers a familiar and trusted interface for enterprise and government users, seamlessly integrating with existing private networks
  • Isolation from the Internet: The Outernet is a fully sovereign, private network—not an extension of the public internet. It is designed to avoid the single biggest source of cyber threats: the internet itself