Cybersecurity

Bertin IT designs and provides a full range of solutions for the defense in-depth
of sensitive information systems & critical infrastructures.

Cybersecurity 2017-03-22T12:55:50+00:00

Our cybersecurty solutions are based on a certified government technology – CC EAL 5+ and proven for high defense needs,as part of more than ten years of experimentation and development on issues of classified information partitioning and secure exchange of sensitive data.

They protect the integrity of your system and information assets by:

Filtering the content imported into your system via any type of removable media

Ensuring the confidentiality and safety of exchanges between networks or systems

Preventing data leakage, whether intentional or accidental

WhiteN®

USB THREATS NEUTRALIZED

WhiteN® is a comprehensive solution for protecting sensitive information systems against all types of potential harmful USB devices. It enables the control of peripheral that are authorized to connect to the IS, to verify the harmlessness and conformity of file formats and to neutralize active content when needed.

Furthermore, the use of partitioning ensures that the host system is never exposed to a non-controlled peripheral device.

more information

CrossinG®

Trusted Gateway

CrossinG® makes it possible to manage data flows and to ensure the confidentiality and integrity of exchanges between two information systems.

High-level network partitioning and advanced processing of incoming and outgoing data flows prevents the risk of an attack spreading from one network to another and also provides protection against harmful content injection and data leaks.

more information

ISSUES

Partitioning & zoning of industrial systems

The control of interconnections between functional or technical zones is a key element in ensuring the architectural security of an industrial system. Without the use of proper zoning (e.g. Corporate / Factory / Workshop, …), an attacker can, for example, hack into a system’s hardware administration by obtaining access to a supervisory workstation.

more information

Breaking the kill chain of a cyber attack

Growing in number, more diversified and more precisely targeted, computer attacks have become commonplace and are becoming more and more sophisticated, to the point that they can now be considered as genuine strategic offensives. Advanced Persistent Threats, or APTs, are characteristic of this new generation of threats, methodically combining several intrusion tools and vectors in order to strike slowly, but surely

more information

our news

  • Assises 2016

Bertin IT leading IT security exhibition

Bertin IT will be present at the “Assises de la Sécurité des Systèmes d’Information“, an IT security exhibition running from 5 to [...]

ECOSSIAN keeps a watchful eye on critical European infrastructures

The ECOSSIAN R&D FP7 project is aimed at creating a paneuropean real-time alert and cyber vigilance system to improve [...]

  • PolyXene awarded France Cybersecurity label

PolyXene® awarded France Cybersecurity label

On 21 January 2015, during the International Cyber-Security Forum (FIC) in Lille,  Axelle Lemaire, Secretary of State for Digital Technologies [...]