HYPERSPHERE IS RECOGNIZED AS A SAMPLE VENDOR in the 2025 GARTNER® EMERGING TECH: BUILD PREEMPTIVE SECURITY SOLUTIONS TO IMPROVE THREAT DETECTION (PART 2) Report

BY HYPERSPHERE TECHNOLOGIES, INC.
May 12,2025
The Cybersecurity Crisis
Traditional cybersecurity approaches have been reactive and thus often referred to as detect-and-respond. In the past, such security has generally been sufficient. Due to the advancements of artificial intelligence (AI) and particularly generative AI (GenAI), reactive approaches are now obsolete.
Dark AI and GenAI-driven threats are dynamic, relentless, and to put in bluntly—well ahead of detect-and-respond security. The world is no longer about guards standing ready atop castle walls to defend against a known, predictable enemy. This ideology is old and using such convention will result in the inevitable breach.
Quantum computing represents another threat on the horizon. One of the most pressing concerns is the potential for quantum computers to break widely used encryption algorithms, such as RSA and ECC, which rely on the difficulty of factoring large numbers—a task that quantum algorithms like Shor’s can perform exponentially faster than classical methods. This vulnerability has led to the emergence of the "Harvest Now, Decrypt Later" (HNDL) threat model.
In HNDL attacks, adversaries—often state-sponsored actors—intercept and store encrypted data today, with the intention of decrypting it in the future when quantum computing capabilities mature. This strategy targets information that remains valuable over time, including trade secrets, personal financial data, and mission-critical data for the battlefield. To mitigate this threat, proactive measures are essential to safeguard data against future quantum-enabled decryption capabilities.
Preemptive Security Solutions
Preemptive cybersecurity (PCS) technologies significantly enhance an organization’s defenses to deny, disrupt, or deceive attackers from gaining a foothold or keeping it. “Additionally, these technologies may help reduce insurance costs and improve audit scores.” See Emerging Tech: Build Preemptive Security Solutions to Improve Threat Detection (Part 2), by Luis Castillo; 2 April 2025.
Figure 1 of this report shows PCS innovations that include both (1) automated moving target defense (AMTD); and (2) advanced obfuscation:
AMTD is based on the military premise that a moving target is harder to attack than a stationary one. AMTD works to disrupt or confuse the attacker.
Obfuscation refers to the process of making something unclear or hidden. Advanced obfuscation technologies use sophisticated methods like postquantum encryption to render data invisible or even impenetrable to attackers. Advanced obfuscation provides always-on protection and resilience to deny advanced persistent attacks, ransomware, or attacks powered by AI.
HyperSphere is Named a Sample Vendor of Advanced Obfuscation
HyperSphere is proud to announce it has been mentioned by Gartner as a Sample Vendor of advanced obfuscation. Gartner subscribers can access the full report at Emerging Tech:Build Preemptive Security Solution to Improve Threat Detection (Part 2), by Luis Castillo; 2 April 2025.
HyperSphere has also been recognized by Gartner as an Example Vendor or Sample Vendor of PCS, including AMTD. See Emerging Tech: Security—Top Trends in Preemptive Cyber Defense, by John Collins, Luis Castillo, Isy Bangurah, Walker Black; 4 September 2024; Emerging Tech: Build Preemptive Security Solutions to Improve Threat Detection (Part 1), by Luis Castillo and Carl Manion; 7 October 2024; Emerging Tech: Adoption Trends in Preemptive Cyber Defense, by Isy Bangurah, Luis Castillo, and Walker Black; 12 November 2024; and Emerging Tech: Provider Strategy Trends in Preemptive Cyber Defense, by Isy Bangurah, Luis Castillo, and Walker Black; 13 November 2024.
HyperSphere’s PCS Solution Uses Advanced Obfuscation And AMTD
A force-multiplier effect against sophisticated threats occurs when combining advanced obfuscation with an additional preemptive technology such as AMTD.
HyperSphere offers a force-multiplier effect as its PCS solution uses advanced obfuscation and AMTD to safeguard data from classic large-scale computing, AI, and quantum computers. The solution secures the data itself—down to the frame level—before it is even written to storage.
When in storage, the data is obfuscated and rendered useless to all but authorized personnel. The solution integrates DoD and NIST security requirements at <1% overhead, all with confidentiality, integrity, and resiliency.
The solution is seamlessly deployed without configuration errors. Advanced obfuscation and AMTD are employed to create a different encryption key per frame for every object and hide each key in fourth-dimensional space. Not only are key vulnerabilities and key management systems eliminated but a single object may contain thousands of keys that can never be lost, stolen, or misplaced, providing additional defense-in-depth against physical and cyber threats. Moreover, any underlying encryption algorithm—whether classical or based in post-quantum cryptography—may be used in the solution, resulting in one that is future-proof.
A graphical representation of HyperSphere’s advanced obfuscation and AMTD technologies may be seen below:
A graphical representation of how HyperSphere may be used to secure mission-critical data before being stored using quantum-resistant encryption and advanced obfuscation with AMTD—from the edge on the battlefield to any cloud service provider—may be seen below:
HyperSphere is the first and only solution to have a published NIST National Checklist hardening guide, derived from NIST 800-53 rev5, and aligning to both FISMA and DoD IL4 baselines. Moreover, these baselines were peer-reviewed by the NSA.
It should now be quickly apparent that HyperSphere is poised to be foundational to an organization’s PCS capabilities.Indeed, we believe HyperSphere is essential to (i) create robust and cost-effective security against multimodal attacks that leverage classic large-scale computing, AI, and quantum computers; and (ii) comply with ever-demanding security standards and privacy laws.
Gartner Disclaimer:
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designations.Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.