Default-Deny-All Technology

How adam:ONE® Works

The world's first Zero Trust Resolver - the first practical and scalable implementation of Default-Deny-All networking

The Core Philosophy

A fundamental shift in how network security works

Traditional Approach

"Trust by default, deny threats"

  • Allows all connections by default
  • Relies on detection to block threats
  • Attackers exploit the gap before detection

adam:ONE® Approach

"Deny by default, trust verified connections"

  • Blocks all connections by default
  • Only allows DNS-verified/policy-allowed connections
  • Disrupt the attack chain without the need to detect

Key Technologies

Six pillars of the adam:ONE® architecture working together to deliver true Zero Trust

Muscle-Brain Architecture

Distributed "muscle" nodes deployed on-premise or in-cloud handle local traffic decisions with resilience and performance. Centralized "brain" controller provides orchestration and policy management.

  • Local traffic processing for speed
  • Centralized control and visibility
  • Resilient if controller goes offline

Don't Talk To Strangers (DTTS)®

Patented technology that enforces DNS as the root of trust. Denies all IP connections by default unless first verified by DNS and allowed by policy, or explicitly permitted via configurable Enablers. Provides dynamic egress control that prevents circumvention, breaks C2 connections, and eliminates data exfiltration channels.

  • DNS becomes security checkpoint
  • Blocks direct IP connections
  • Breaks C2 and prevents exfiltration

AI-Driven Dynamic Allowlisting

adam:ONE® utilizes AI/ML engines to power dynamic allowlisting. This overcomes the issue of maintaining a static allow list and enables a "Never trust, always verify" zero trust approach without disrupting business operations.

  • Fixed Rules, AdaptiveAI, ReflexAI
  • Policy matched to user or device role
  • See detailed breakdown below

DNSharmony® Aggregation

Aggregates multiple pDNS threat intelligence sources including open source feeds (Cloudflare, Quad9, CleanBrowsing, AdGuard) and commercial services. Provides pDNS redundancy, continuous domain validation, and acts as resolver of last resort with real-time threat intelligence.

  • Multi-source threat intelligence
  • Redundant pDNS resolution
  • Enhanced detection accuracy

Full Layer 2 Visibility

Complete network visibility with automatic device discovery and inventory. Enables automatic quarantine and per-network policy assignment - the value of NAC without the complexity.

  • Real-time device inventory & automatic quarantine
  • Complete East-West traffic protection
  • Automatic shadow IT detection

Sovereign Data Custody

Privacy by design: honors TLS and end-to-end encryption without proxies. No centralized decryption required. Sovereign data custody with distributed protection.

  • No TLS interception needed
  • End-to-end encryption preserved
  • Decentralized architecture
AI-Driven Dynamic Allowlisting

Intelligent Policy Engines

adam:ONE® utilizes AI/ML engines to power dynamic allowlisting. This overcomes the issue of maintaining a static allow list and enables a "Never trust, always verify" zero trust approach without disrupting business operations. Policies are assigned per device or group, enabling granular control down to the individual device to address a non-uniform attack surface.

ZTc AdaptiveAI logo mark

AdaptiveAI

Takes a learning mode approach over 30 to 90 days on a per site or per network basis and dynamically adds domains as requested by user(s). Each request passes through a cloud-based sandbox testing and AI inspection which deems whether it is safe. Only domains deemed safe from all discovered dependencies are added to the dynamic allowlist.

Recommended for:

  • - Very defined user roles (e.g. Accounting)
  • - High Value Assets such as C-suite
  • - Incident Response (skip learning phase)
  • Phishing mitigated - only allowed domains can connect
  • Midstream redirect attacks blocked by default
  • Domains held for human inspection before allowing
ZTc ReflexAI logo mark

ReflexAI

Patent pending dynamic allow-listing engine where 82 domain categories/tags are sorted into 5 decision buckets: Always Block, Block, Review, Allow, Always Allow. The AI/ML engine handles conflict resolution with 3 decision levels: Permissive, Hold for Human, Protective. No learning mode required - dynamic allow-lists are created in real-time with an average 20ms response time. That is 20 decisions per blink of an eye, with no disruption to the end user.

5 Decision Buckets:

Always BlockBlockReviewAllowAlways Allow
  • User-transparent protection - no disruption
  • Proactive defense against phishing and redirects
  • Uncategorized/unknown domains denied by default
  • Appropriate Use Policies enforceable

Composite Static Rules

Using pre-made lists or by observation, a collection of required internet domains and/or FQDNs are established as an allow-list. Fixed traffic to only allowed resources with no circumvention even if the asset is compromised.

Typically used for:

  • - Active Directory Controllers
  • - File/Application Servers
  • - Web Servers
  • - IoT Devices, Printers/Scanners
  • Fixed domain traffic to only allowed resources
  • No circumvention even if asset is compromised

Combining any of these policy engines with DTTS® brings devices into a Zero Trust Connectivity (ZTc) state - proactively protected with true egress control against malicious outbound connections such as C2 beacons or data exfiltration. Even if a user clicks a malicious link, the Default-Deny-All state will refuse the connection unless verified and allowed by policy.

The Protection Flow

How adam:ONE® processes every connection request

Diagram of adam:ONE Default-Deny-All protection flow
1

Start in Default-Deny-All State

Every device begins with zero network access. Using aggregated pDNS intelligence merged with AI-driven dynamic allowlisting (AdaptiveAI or ReflexAI), a policy is built as the device needs to access verified connections to web services.

2

DNS as Root of Trust

Don't Talk To Strangers (DTTS)® technology enforces DNS as a functional root of trust, denying all IP connections by default unless first requested by DNS and allowed by the dynamic policy. This prevents direct IP-based attacks.

3

Verify and Open Connection

If allowed by policy, adam:ONE® opens a hole to establish the verified connection. The connection is monitored in real-time and collapsed as soon as it expires or is no longer needed.

4

Cross-Check with DNSharmony®

Allowed connections are continuously validated by DNSharmony® aggregation of pDNS resolvers of your choice. When used with AdaptiveAI/ReflexAI dynamic allowlisting, DNSharmony acts as a resolver of last resort - providing a final check to ensure a trusted domain hasn't gone "bad" while aggregating threat intelligence in real-time for resilience beyond a single resolver.

The Result

Zero Trust connectivity for any device requesting connection through adam:ONE®. ZT protection invisible to the user.

Enterprise Architecture

Where adam:ONE® Lives in Your Stack

adam:ONE® integrates seamlessly with your existing security infrastructure, working alongside your current tools while providing foundational Zero Trust protection at the DNS layer.

adam:ONE Typical Enterprise Implementation diagram showing cloud assets, on-prem assets, and integration with existing security stack

Complements Existing Tools

Works alongside SIEM, SOAR, NDR, IDS/IPS, NGFW, and ZTNA solutions

Zero Trust Resolver

AI-driven dynamic allowlisting via DNS with DTTS® enforcement and DNSharmony® aggregation

Flexible Deployment

Supports cloud assets, on-prem infrastructure, and roaming devices via adam:GO®

Device-Agnostic Protection

Out-of-band protection means adam:ONE® works with all types of devices including OT, IoT, and IT with no endpoint agent required

IT Devices

Laptops, desktops, servers, mobile

IoT/IIoT/MIoT

Smart devices, sensors

OT/ICS

Industrial controls, SCADA

Legacy Systems

Any OS, unmanaged devices

Proven in Critical Incidents

These technologies come together powerfully in incident response scenarios. adam:ONE® has been deployed as a first and critical tool for IR, enabling organizations to immediately adopt a ZTc state, neutralize active threats and restore operations within hours while maintaining complete radio silence to threat actors.

See Real-World Case Study

Ready to Get Started?

See how adam:ONE® can reduce your attack surface by 7000:1