Resources

Guide

Augmenting Existing Security Infrastructure

Today, all organizations have information security technology in place, but much of it is centered on ‘traditional’ security applications. For example, anti-virus as part of an endpoint security solution, firewalls, and intrusion detection/prevention systems on the network.
Datasheet

Cross Domain Gateway Filters

Today there is a growing requirement for Cross Domain Solutions (CDS) across internal defence realms, between nations, and across the defence information supply chain. While custom hardware is frequently used in the form of a data diode to execute the actual transfer, there is a need to verify and validate the content prior to the transfer. Business Problem The need to share information is growing...