Hi there, W.
Sorry to hear you’re having trouble with bypass tools. The good news is: The adam:ONE™ technology stack DOES SUCCESFULLY BLOCK PSIPHON & all other known bypass tools. However, if you made any error as an admin to create a hole it will find its way out. And with Psiphon (which requires only one click of a button), all break-outs from any firewall are normally described as “easy” since Psiphon automates the hard work to seek out the hole for the user.
This is just one of the many use cases why the Managed Security Service plans exist (MSS / MSS+). All of our managed clients have a solid success rate in blocking ALL bypass tools (Including Psiphon, VPNs, Proxies, TOR etc.) Maintaining a secure network in a dynamic environment is unfortunately never a set-and-forget operation.
NOTE: Apart from the Psiphon Neutralizer, You have to use Adaptive AI Allowlisting, in conjunction with DTTS® (correctly configured).
Some of the most common mistakes admins make that Psiphon takes advantage of are:
- Permissive firewall rules.
- Not running Adaptive AI Whitelisting / or not running it correctly.
- Network configuration errors.
- DTTS® not properly set up.
For any users that are concerned about protecting their network / people effectively against bypass tools like Psiphon, we recommend they take advantage of the Managed Plans. All of the variables that are required is covered continuously by the assistance of our engineers and specialists under MSS / MSS+.
You could also consider doing XNS service on a per incident basis to help resolve errors that is allowing Psiphon through… But an ongoing pro-active approach under the care of MSS+ is a far more effective approach than trying to fix mistakes after they occur. So we actually don’t recommend the reactive approach. MSS+ is the way to go.
Either way, we’d love to help get you and your network secured properly. Feel free to reach out to firstname.lastname@example.org if you need to consider moving to MSS / MSS+.