HYDRA uses advanced algorithms to provide unparalleled security in every subsystem, ranging from cryptographic key generation to session ID's and even code injection mitigation. These algorithms are another unique aspect of HYDRA that no other similar system can match.


Biomorphic Mathematics is a relatively new field of study which analyzes the way algorithms can emulate nature. The most important research to come out of this field relating to security is around that concept of biodiversity. To help understand this concept, consider a real example from nature, the cheetah. Few people know that the Cheetah is endangered, despite a large, heathy population. Biologists' concern is that the cheetah's genes are all too similar to each other. If a "cheetah virus" were to break out, the entire species could be devastated.

So it is with our computer systems. Since one installation of Windows is very much like any other, viruses and worms can spread over the Internet virtually uncontained. That is why several years ago, root servers are the Internet backbone begun to purposefully use different server operating systems from each other, to "increase the diversity of software."

HYDRA takes this to the next level and introduces the diversity concept to make each HYDRA different from any other HYDRA, and different from any other existing server or device from the TCP stack to the Web server. The same way humans have enough biodiversity to keep some of us immune to a strain of the flu while others suffer the symptoms, HYDRA's uses the diversity to improve resistance to attacks of all kinds. Unlike a human, however, HYDRA can change it's inner organization both at startup and during normal operation. So in the unlikely event it "catches a flu," changes can render HYDRA immune almost instantly.

To learn more about HYDRA's use of Biomorphics, visit the Download Section, or Contact Us directly.