Our solutions are based on a certified government technology – CC EAL 5+ and proven for high defense needs, as part of more than ten years of experimentation and development on issues of classified information partitioning and secure exchange of sensitive data.
They protect the integrity of your system and information assets by:
Filtering the content imported into your system via any type of removable media
Ensuring the confidentiality and safety of exchanges between networks or systems
Preventing data leakage, whether intentional or accidental
WhiteN® is a comprehensive solution for protecting sensitive information systems against all types of potential harmful USB devices. It enables the control of peripheral that are authorized to connect to the IS, to verify the harmlessness and conformity of file formats and to neutralize active content when needed.
Furthermore, the use of partitioning ensures that the host system is never exposed to a non-controlled peripheral device.
CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.
High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.
As its name suggests, OneStation® makes it possible to access data, applications, domains or networks of differing sensitivity levels (e.g. public vs. restricted) from one single work station, while ensuring complete data confidentiality and partitioning.
In this way, users can access web browser applications for example at the same time as a confidential database, without any risk of leakage or of compromising the critical domain.
The control of interconnections between functional or technical zones is a key element in ensuring the architectural security of an industrial system. Without the use of proper zoning (e.g. Corporate / Factory / Workshop, …), an attacker can, for example, hack into a system’s hardware administration by obtaining access to a supervisory workstation.
Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely…