AWS Partner Network (APN) Blog
Unlocking Secure Data Access with Dispersive Stealth Networking and AWS
By: John Walsh, Partner Solutions Architect – AWS
By: Namita Mathew, Solutions Architect – AWS
By: Lawrence Pingree, VP Technical Marketing – Dispersive
By: Amy Levine, Director of Marketing – Dispersive
![]() |
![]() |
Organizations of all sizes are looking to improve how they secure and connect their distributed workloads beyond traditional networking approaches. This includes looking beyond conventional methods such as static virtual private network (VPN) tunnels or single-path software-defined wide area network (SD-WAN) solutions. These methods may face challenges in providing optimal security, performance, and resilience needed for effective operations and sensitive workloads. These factors become increasingly complex in hybrid or multi-cloud architectures with geographically dispersed remote users. A solution is needed that goes beyond traditional networking approaches to improve the security and performance in hybrid or cloud native environments.
Dispersive Stealth Networking, an AWS Partner, offers innovative networking solutions that transform how organizations connect their distributed environments. Their patented Stealth Networking technology implements Zero Trust principles, a security model that treats all users and devices as untrusted until verified, alongside Preemptive Cyber Defense (PCD) capabilities, all while leveraging AWS infrastructure for optimal performance and reliability. This post explores how Dispersive Stealth Networking technology on AWS helps organizations build secure, high-performance connectivity that supports their business objectives.
Securing Modern Networks Beyond Traditional VPN Approaches
Organizations find their attack surface (entry points for threat actors) expanding through hybrid work, multi-cloud environments, and Internet of Things (IoT). However, traditional perimeter-based security models require enhancement to confront evolving security requirements, such as the looming threat of quantum computers potentially breaking current encryption methods. To address this, Dispersive developed Stealth Networking technology that enables organizations to reduce network access, implement Zero Trust, and strengthen security postures beyond traditional VPN capabilities. As sophisticated threats like quantum computing threaten current encryption methods, this new approach provides agile, resilient security for data in transit, seeing up to 10x throughput improvements and 20% decreased latency. This connectivity can span across various locations and access points, offering improved speed and scale to meet the demands of modern organizations.
AWS and Dispersive Stealth Networking for Quantum-Resistant Zero-Trust Cloud Security
Dispersive Stealth Networking, partnering with AWS, offers a revolutionary approach to secure remote access and network security through its patented Stealth Networking technology. So, what is “Stealth Networking”? This approach makes the network virtually invisible to attackers, as there is no single-entry point or static IP address to target from an attacker’s point of view. By leveraging AWS’s global infrastructure, Dispersive Stealth Networking ensures low latency and high availability for any remote edge-to-cloud networks and enables Zero Trust Remote Access to both users and sensitive workloads, regardless of location. The solution is easy to deploy with both a managed SaaS and self-deployment options. Dispersive Stealth Networking also delivers sensitive access and extends Zero Trust into the cloud to access Amazon Virtual Private Clouds (Amazon VPCs), cloud workloads, and containers for remote administrators, data scientists, sensitive applications, and developers.
This solution uses Zero Trust and Preemptive Cyber Defense, replacing VPNs, which decreases attack surfaces and offers high-performance networking on Amazon Elastic Compute Cloud (Amazon EC2), load balancing, and auto-scaling infrastructure. As shown in Figure 1, Dispersive’s spread spectrum style technology splits traffic into multiple streams, encrypts each individually with unique keys, and dynamically routes them across multiple paths, effectively eliminating the network’s attack surface. Traffic enters Dispersive’s Deflection Cloud through Gateways leveraging EC2 instances for compute power, allowing customers to choose instance sizes appropriate for their throughput and performance needs. Gateways are deployed within customer Amazon VPCs, integrating seamlessly with existing subnet routing tables and security groups to enforce network segmentation and access control. The Dispersive Stealth Networking solution can be used to protect and isolate entire VPCs or specific subnets containing sensitive workloads.

Figure 1. Dispersive Stealth Network with Split-Session Multi-Path
The following points describe the Dispersive Stealth Networking split-session multi-path approach step by step.
- Split-Session Multipath – Data streams are split at the authenticated source and re-addressed with a Dispersive header to force traffic to follow different network paths based on instructions from the Dispersive Controller across one or more physical circuits.
- Data Deflections – The underlying IP networks deliver these packets to Dispersive software nodes known as Data Deflects. Placement of these deflects influences the actual physical paths traversed.
- Rolling to Next Path – New paths can be established/rolled during the transmission enhancing performance by avoiding link failures and bypassing congested pathways.
- Deflections Re-Address Packets – The deflects receive the packets and re-address them for the final destination.
- Data Reassembled – The authenticated destination reassembles the split packet streams and strips out the Dispersive header information before passing the original packet to the receiving application. Missing packets are re-requested to ensure guaranteed packet delivery.
Figure 2 depicts a common scenario where a customer can deploy Dispersive’s solution to extend connectivity between their hybrid cloud environment and deliver transit zones. An example is a global financial services firm needs secure connections for trading floors, datacenters, and cloud analytics, while ensuring low latency and meeting strict regulations. In these zones, Dispersive Stealth Networking specialized multi-path technology can be deployed into the middle area between your branch, datacenter, edge, or AWS environment to connect your important assets with Zero Trust extending universally from site to site. To support this setup, Dispersive deploys gateway clusters in Amazon VPCs and at other key locations, connecting to AWS Cloud WAN to create a transit zone for zero-trust connectivity.

Figure 2. Extending Zero Trust with AWS Cloud WAN Protected by Dispersive Stealth Networking
Future Proof Infrastructure with Preemptive Cyber Defense
Traditionally, organizations have relied on reactive cybersecurity measures, responding to threats only after they’ve been detected. Preemptive Cyber Defense transforms this approach by implementing proactive strategies to prevent attacks before they occur.
AWS customers can deploy Dispersive Stealth Networking’s solution to leverage PCD technologies that go beyond conventional security methods. Built into its network platform, Dispersive’s approach enhances data protection using pre-planned measures and techniques to disrupt attackers before a data breach occurs. Figure 3 shows how the solution conceals network devices, data flows, and communications, enhancing security and ensuring Zero Trust isolation of users, assets, and services. Dispersive Stealth Networking protects against attacks by reducing the attack surface, hiding crucial assets, and making it difficult for attackers to identify, target, and exploit vulnerabilities.
Figure 3. Dispersive Stealth Networking Preemptive Cyber Defense
Outcomes
Dispersive Stealth Networking’s solution on AWS delivers measurable improvements in security, performance, and cost efficiency. Organizations implementing the solution have experienced:
- Up to 10x improvement in network throughput
- 20% reduction in application access latency and critical data transfer
- Approximately 30% decrease in total networking costs through legacy VPN replacement and simplified branch connectivity and network management
Table 1 below summarizes common challenges faced by AWS customers and how Dispersive Stealth Networking technology addresses each one.
AWS Customer Challenge | Dispersive Stealth Networking Solution/Feature | Key Benefit |
---|---|---|
Securing Remote Access to VPC Resources | ZTNA (Zero Trust Network Access) via Dispersive Stealth Networking Virtual Thin Client & Gateway | Secure VPN Replacement, Granular Access Control |
High Latency for Globally Dispersed Workspaces Users | Multi-Path Optimization & Dynamic Routing | Improved User Experience, Reduced Latency |
Protecting Sensitive AI/ML Data & Models on EC2/S3 | Secure Enclaves, Workload Isolation, Stealth Networking | Data Confidentiality, Integrity, Attack Prevention |
Simplifying Multi-Region SD-WAN Deployment on AWS | Integration with AWS CloudWAN Tunnel-less Connect | Reduced Overhead, Increased Throughput, Simplicity |
Securing Hybrid Cloud Connections (On-Prem to AWS) | DispersiveFabric/Cloud Overlay Network | Consistent Security Policy, Secure Data Transit |
Reducing Network Attack Surface for Compliance/Security | Stealth Networking, Traffic Obfuscation, Multi-Path Dispersion | Proactive Threat Prevention, Enhanced Security |
Ensuring Resilient Connectivity for Critical Apps | Multi-Path Routing, Automatic Failover, Self-Healing Capabilities | High Availability, Minimized Downtime |
Future-Proofing Against Quantum Threats | Quantum-Resistant Encryption, Path Randomization | Long-Term Data Protection Assurance |
Table 1. AWS Customer Benefits (At a Glance)
Conclusion
Dispersive Stealth Networking on AWS delivers comprehensive security through quantum-resistant architecture, reducing infrastructure attack surfaces and eliminating both traditional VPN and multifunction security system vulnerabilities. The solution optimizes network traffic flow, and through it’s proactive approach protects against advanced threats while maintaining performance and ensuring long-term data protection even under degraded long haul or remote access conditions. By implementing this Zero Trust solution that works seamlessly with existing applications and AWS services, organizations can effectively protect their sensitive workloads from evolving threats while meeting the performance demands of modern cloud environments.
To get started with Dispersive Stealth Networking on AWS, simply choose between DispersiveCloud (fully managed SaaS) or DispersiveFabric (self-managed overlay). After deployment, configure Dispersive Gateways in your target VPCs and implement Zero Trust access policies for seamless integration with your existing AWS infrastructure. Visit Dispersive Stealth Networking’s AWS Partner page for detailed documentation and implementation support.
Dispersive Stealth Networking – AWS Partner Spotlight
Dispersive Stealth Networking is an AWS Partner that delivers innovative secure access and network security through its patented Stealth Networking technology. Their solution enhances traditional connectivity with Zero Trust principles and Preemptive Cyber Defense, providing high-performance networking on AWS infrastructure while supporting business-critical operations.
Contact Dispersive Stealth Networking | Partner Overview | AWS Marketplace