ZERO TRUST FOUNDATION

Security

SECURITY

Key security features

AOK is engineered and built for IL6 and tested for IL5 compliance, offering a mobile-first, edge-optimized solution that prioritizes data protection, strong identity, and authorization requirements.

Auditing
and compliance

Extensive auditing and reporting capabilities allow for detailed tracking of who accesses what information and when, assisting compliance with relevant security standards, including NIST, DOD, and other regulations.

End to end
data encryption

All applications built on our platform incorporate FIPS 140-2 encryption for data at rest and data in transit, with NIST- validated cryptographic modules up to IL6.

Flexible
authentication options

AOK supports integration with the existing identity management solutions, enabling capabilities such as CAC authentication, PIV card, and WebAuthn/FID02 authentication.

Remote wipe
and access controls

Ensure the right people can access and control key information with role-based access control, remote wipe, remote access verification, multi-factor authentication, and device authentication.

Cloud security
and resilience

Adyton's software is hosted on AWS GovCloud, ready to deploy on CloudOne, and is deployable into any enterprise cloud environment.

Data security
tagging

AOK employs extensible attribute-level security tagging for CUI and Classified (CAPCO), enabling partner and cross domain data interoperability.

SECURITY

Zero trust architecture

Adyton's Zero Trust architecture is the foundation of our suite of mobile-first defense products. Our framework eliminates implicit trust and continuously validates every stage of a digital interaction.

Safely and securely deploy AOK on personal and government-issued devices thanks to AOK’s robust security features, including flexible single sign-on (SSO), zero-trust context & security policies, and granular data protection down to the atomic data element level.

Ensure information is protected and only authorized personnel can query and access specific datasets based on strict, predefined permissions.

COMPLIANCE

Our Zero Trust platform has been awarded a Certificate to Field.

All Adyton Operations Kit modules are designed to meet the most sensitive workloads including IL5+ and Classified use cases.

Purpose-built features to address US federal NIST 800-53r5 security controls.

Detailed logging of user interactions and data changes help ensure compliance

FIPS 140-2 Security Level 3 compliant: Store sensitive government information on secure cryptographic modules.

Designed for DoD FedRAMP+ MMX (Control Overlay)

Built to meet CNSSI 1253 and CNSSI 1253F data protection standards to include privacy marked data including PII and PHI.

Compliant with: DoD CC SRG, NIST 800-63r3, NIST 800-124

Explore purchasing and contracting pathways

BASIC ORDERING AGREEMENT

Sponsored by the US Navy, any DOD branch can purchase production and deployment licenses of AOK

Sole source justifiable (SBIR III)

AOK is sole-source eligible through The Small Business Innovation Research Phase III. SBIR data rights apply to components of Adyton’s technology through our AFWERX SBIR grants.

Army chess catalog

Submit an RFI/RFQ for AOK, a commercial-off-the-shelf (COTS) solution through the CHESS portal.

DOD Vendor Demonstration Agreement

Deploy AOK for limited scope demonstration usage under a standard DOD Vendor Demonstration Agreement (VDA).

ACT FASTER
— from the garrison to
the battlefield
CONTACT US