Products
Highly manageable solutions to ease financial and management burden, to mitigate the forces of disruption
Be purposeful in technology investments. Minimise unnecessary technical complexity by adopting scalable solutions that fit the size of your enterprise.
A comprehensive offering to shape your resilient IT, and regain visibility, control and security over your network and eco-system even in the face of challenges and when Cyber Security fails.
Deliver services guaranteeing persistent protection from the endpoint to your Network (SElink).
For more comprehensive protection, a combination of (SEcube) hardware and software provides a higher security to defend the network against threats.
SElink is the evolution of traditional ways to deliver and protect services from unauthorised access integrating smart mechanisms for network isolation, network efficiency and security in one single product.
SElink is a virtual overlay that addresses foundational network vulnerabilities and neutralises traditional attack surfaces. It locks down the physical network while maintaining its full functionality and works smoothly within the existing infrastructure. The result is a seamless integration with existing systems.
SElink lays its foundation in Advanced Zero Trust Networking principle - isolation, micro-segmentation and multi-dimensional continuous authentication - Post-Quantum Cryptography and Crypto Agility. The result in unmatched Network efficiency, Stronger Security and Lower Cost and Energy use.
A great use case for SElink is the replacement of VPN, solving remote connectivity issues and addressing security weaknesses typical of SSL/TLS protocols.
SEcube is the smallest reconfigurable silicon combining three main cores in a single-chip design.
Low-power ARM Cortex-M4 processor, a flexible and fast Field-Programmable-Gate-Array (FPGA), and an EAL5+ certified Security Controller (SmartCard) are embedded in a BGA 9x9 mm package. Products implementing SEcube leverage the chip to manage processes and safeguard the cryptographic algorithm and keys used to secure transactions, applications, and sensitive data.
Open source tools for security experts who what to verify, change, or write from scratch the whole system starting from the elementary low-level blocks. Alternatively, optimised firmware to move on with your developments at a faster pace.
We raise industry standards by assessing capabilities and processes through our solutions, while maintaining B5 status as innovation leader.
HALL: S3
STAND: C44