Overview
Features
Specifications
Downloads
How to Order
System Diagram Isolator models addressed in this page:
------------------------------------------------------------------------------- The secure isolator prevents vulnerable peripherals from mediating between compromised and secure computers by ensuring that video, audio and USB data flows in a single direction. By preventing host-to-peripheral direct access the secure isolator eliminates data leakage. The secure isolator is designed to provide the highest possible computer & peripheral isolation as demanded by government agencies, military, financial institutions and similar security sensitive customers. The isolator perfectly suites scenarios where vulnerable peripherals or computers may impose a security threat. For example, in a secure meeting room, when an unsupervised (non-secure) guest laptop has to be connected to a projector which is shared with a classified computer. By isolating the classified computer from the projector the secure isolator protects the classified computer from being infected by the guest computer compromising any projector’s vulnerability. Additionally, by allowing sound to travel only in one direction from the PC to the speaker, the isolator protects against eavesdropping attempts hence prevent intruders from compromising a computer's security and re-tasking the audio line-in (headset/speaker) into a microphone line. How does it work?
Monitor / Display Threats Protection
Audio Threats Protection
Hardware & Firmware Tampering Protection
USB Threats Protection
Related Products
|
Jul 8, 2018
May 4, 2017
Mar 27, 2016
|