CROSS DOMAIN SECURITY SOLUTIONS
CROSS DOMAIN SECURITY SOLUTIONS
Network segmentation is an important element of IT security concepts. The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks/systems of different sensitivity level.
Network segmentation is an important element of IT security concepts. Organizational networks are divided into segments based on criticality and sensitivity requirements of data and systems. Network segments that hold particularly sensitive data (e.g., national RESTRICTED or SECRET classification) are many times isolated (“air gapped”) or available through limited enforced communication patterns and data flows.
Similarly, the zero-trust model distrusts all endpoints, applications, and users. All internal and external communication must be checked. Any user or service must authenticate itself. Many IT security concepts only focus on minimizing external threats which is a weakness exploited for Cyberattacks.
This is where Cross-Domain Solutions (CDS) come in. These are highly trusted, government-accredited network security components (e.g., Security Gateways, Data diodes) that control and, if necessary, block the flow of data between two security domains at all layers.
The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks/systems of different sensitivity level as well as the creation of NATO STANAG 4774/8 compliant and tamper proof security labels. The SDoT product family offers the most comprehensive cross-domain solutions on the market for network security and data leakage prevention (DLP). SDoT products enable digitization in sensitive or extremely critical areas, as data is exchanged and made available in a controlled manner while sensitive data remains protected.
System Features
- Ensures robust protection of sensitive data with enhanced security measures, including a hardened HSM (Hardware Security Module).
- Provides physical separation of components to prevent unauthorized access and tampering, ensuring hardware separation.
- Includes measures to mitigate and prevent DoS attacks, ensuring uninterrupted operation.
- Incorporates secure administration practices and protocols to prevent unauthorized access and maintain data integrity, ensuring secure administration.
- Complies with the highest security standards (EAL4+ Level), providing a high level of assurance for data protection.
- Designed to operate in diverse climate conditions, making it suitable for various environments.
- Built with protective measures to prevent dust infiltration and ensure smooth operation in dusty environments.
- Designed to withstand shocks and vibrations, ensuring reliable performance even in rugged conditions.
- Utilizes a secure operating system with a trusted boot process (L4 Mikrokern OS with Secure Boot), enhancing system security.