SoundSentry™ Secure Meeting Room Solutions

Upgrade meeting spaces to enable multi-classification discussions

Harden any meeting room, Secure every conversation.

One room,
 Any Classification

Hardware-level
 Data Security

Retrofit-ready Architecture

Seamless Security Level Switching

SoundSentry™ secures any meeting room, enabling classified and unclassified discussions in the
same space with uncompromising protection of sensitive information. It integrates easily into
existing infrastructure or serves as the core of new high-security environments.

Uninvited threats have joined your meeting

Network infiltration

Compromised guest devices gain direct access to secure networks by exploiting KVM switch and peripheral device vulnerabilities.

Peripheral surveillance

Microphones, speakers, displays and cameras can be exploited for persistent eavesdropping, malicious code injection and data exfiltration.

Acoustic exploitation

Speakers deliver high-frequency audio signals to exfiltrate data.

Smartphone

  • Eavesdropping
  • Unauthorized Bluetooth connections
  • Wifi Data Breaching

Videobar

  • High-frequency 
data transfer
  • Eavesdropping
  • Unauthorized Bluetooth connections
  • Wifi Data Breaching
  • Storage attacks

SmartTV

  • Wifi Data Breaching
  • Unauthorized Bluetooth connections
  • Compromised USB devices
  • Storage-based attacks

Commercial KVM

  • Compromised USB devices

Introducing SoundSentry™

SoundSentry is the world’s only solution specifically designed to enable discussions of any classification level in a single, dual use
meeting room with a seamless transition between modes.
By introducing hardware-level measures to the conferencing infrastructure, any meeting room can be hardened against data breaches
and eavesdropping attempts.

SoundSentry includes these key components for a secure meeting room setup:

Adaptive Configuration to Dynamic Environments

SoundSentry can be integrated into any meeting environment. From executive offices to boardrooms, each comes with its own set of vulnerabilities.

Explore the use cases how SoundSentry addresses each attack surface:

Share Peripherals. Not Data.

Establish a hardware-enforced barrier that enables the use a single set of peripherals across classified and unclassified networks without bridging the air-gap.

SECURE PERIPHERAL SHARING Share a single set of peripherals across multiple air-gapped networks and classification levels. HSL’s NIAP-certified KVMs enforce absolute data isolation, making data leakage between sources impossible.

UNIDIRECTIONAL, WIRED DATA FLOW Eliminate hardware-level data breaches with HSL’s media diodes. These create a physically enforced, unidirectional data path, making it impossible for data to leak back from a media device to the source computer.

SMART POWER-MANAGEMENT – Instantly harden meeting room security by cutting power to vulnerable peripherals like displays and videobars. This offers a true hardware disconnect, a level of security that simply muting a device cannot provide.

DOWNLOADS

Presentation

Use Cases

Brochure

Need some help?