We provide three types of embedded security devices:
|
![]() |
ManAl Mail Gateway: Configures in seconds and provide a secure email gateway with many antispam and other features. Ideal for small and medium businesses.
Logging and Sniffing Server: Covert and easy to manage server for backup logging, investigative sniffing, and compliance monitoring for network traffic.
Network Intelligence ToolKit: A Government Only network data collection and analysis toolkit.
Responder: A Combined Logging and Sniffing Server, Network Intelligence ToolKit, and automated network response mechanism in one box.
Diodes Implement Software or hardware Enforces one-direction information flow for transport of information from open or untrusted networks into internal trusted networks.
Enterprise volume discounts available for infratructure-wide logging server applications. Central Logging Server Control and Network Security Management Integration is also available on a semi-custom basis.
We now provide embedded systems in a variety of form factors. The standard form factors are:
Standard COTS PC AT-style small system cases (15"x8"x15"). Standard COTS cases hold up to 3 120Gig IDE drives, a CD, floppy, up to 5 Ethernet interfaces, KVM, USB, and other typical COTS interfaces.
Shuttle Computer Cases (8"x7"x12"). Shuttle cases include 2 Ethernet ports, up to 2 120 Gig IDE drives, CD-ROM/burner, floppy disk, KVM, and other standard COTS interfaces. Five (5) Ethernet edition also available at additional cost.
Embedded System Cases (7.5"x2"x14"). Embedded system cases (depicted above) have three ethernet interfaces, KVM interface, and 2 USB interfaces and hold one 2.5" disk drive. Five (5) Ethernet edition also available at additional cost.
Notebooks (9"x2"x12"). Notebook versions have three ethernet interfaces (two are PCMCIA cards), USB, display, keyboard, touch pad or eraser mouse, other interfaces and hold one 2.5" disk drive - typically with 20 Gigabytes.
Rack Mount cases (1u and 2u sizes). Rack mopunts include up to 16 Ethernet interfaces, KVM interface, up to 4 IDE disk drives, CD-ROM/burner, and floppy disk.
These systems are all configured with White Glove for rapid recovery after power failure even for large file systems and all systems have automatic restart after power failure. All devices come with built-in user manuals and help files. The most common form factors for each item are priced below. For other form factors, contact your sales representative.
Logging Server - Call for prices | Logging Server: Our Logging and Sniffing Server provides a platform for silently monitoring networks and logging audit trails from other servers on the LANs it connects to. It includes gigabytes of disk space and analysis and retrieval tools from a control interface. Standard COTS form factor is the most common order and priced here. It includs 2 120Gig hard drives and 3 Ethernet cards. The Shuttle version includes 2 120Gig Hard disk drives and 5 Ethernet ports. The rack mounted version comes at this price with 3 120Gig hard drives and 6 10/100 Ethernet interfaces. The embedded systems version includes 3 10/100 Ethernet interfaces and 1 20gig hard drive. The laptop logger comes with one ethernet card and is expandable to 3. Spec Sheet - QuickStart |
NIT - Call for prices
Spec Sheet | Network Intelligence ToolKit: NIT is a unique network intelligence gathering and analysis platform. It is based on the deception-based DoD network protection implementation associated with Responder, but augmented for TSCM network analysts to replace noisier tools. It is completely passive, like the Logging Server but it also has other substantial capabilities. NIT is ONLY available to authorized US Government Federal Intelligence Agencies. NIT comes in a special government only form factor. |
Responder - call for prices
Spec Sheet | Responder: Responder is an active defense device that creates cognitive dissonance in attackers and their tools. Without interfering with normal work, it rapidly and automatically detects and responds to many attacks, leaving extensive audit trails and locking out serious offenders. It slows many Internet worms, impedes network intelligence efforts, and prevents attackers from attaching to your network. Responder is licensed with initial customization and installation and is ONLY available within the United States to approved US customers. Customers are required to sign additional contracts prior to use. Responder includes the NIT, DNS, and Logging Server capabilities. Responder is ONLY available to authorized US Government Federal Intelligence Agencies. Responder comes in a special government only form factor. |
Soft Diode - Call for prices | Soft Diode: The software version of the digital diode is a device that allows information to flow into a network without allowing internal information to flow out. It operates by providing inbound file transfers from an 'outside' network and allowing an internal network to download those files in a read-only mode. It provides a low cost reasonable assurance system for secure infrastructure without sacrificing access to outside capabilities. The soft diode comes standard in COTS and Rack Mounted form factors. Spec Sheet |
Hard Diode - Call for prices | Hard Diode: The hardware digital diode is a hardware version of the soft diode that provides very high assurance against information leaks. It operates by physically connecting two computers so that one computer can only send information to the other and cannot receive information back. Reliable transmission is handled by a combination of hardware and software capabilities. The Hard Diode comes in 2 COTS computers or two 1U racks for physical separation of transmiting and receiving sides. Spec Sheet |
Our standard embedded system hardware platforms can be customized to contain customer applications and special security functionality. Customization is done on a fees paid basis after which we provide embedded system units on a volume discount basis.
For providers who want to create their own security devices, we do systems integration using our embedded platforms as a base and adding or modifying as appropriate to your hardware and software needs to create semi-custom embedded security devices based on your requirements.
Semi-custom devices must fit in our standard embedded system case and meet limitations on space, power, and performance associated with that platform. They include uninterruptable internal power, noiseless operation, and serial and Ethernet interfaces.
Rates for semi-custom devices are based on time and
materials. Once developed to your need, discount rates for volume
manufacturing, labelling, and drop shipping capabilities are available.
Custom devices with custom functionality:
Working with our suppliers and engineering team, we can develop custom embedded security devices to meet special needs. Contact us with your details and we will discuss ways we can help you.
For providers who want to create their own security devices, we do systems integration using our embedded platforms as a base and adding or modifying as appropriate to your hardware and software needs to create semi-custom embedded security devices based on your requirements.
Rates for semi-custom and custom devices are based on time and materials. Once developed to your need, discount rates for volume manufacturing, labelling, and drop shipping capabilities are available.
Terms and Conditions: All orders are FOB our shipping point, payment due before shipment. 60 day limited warranty for parts and labor. Prices exclusive of tax and customs fees. All orders are final. Typical delivery 15 days from order, however, due to supply and delivery limitations and seasonal variations, 45 day maximum delivery times are sometimes in effect. Payment by check, money order, or credit card. No COD. Technical support via email and web. Prices, delivery, components, and capacities subject to change without notice.
US Patents: 7,107,347, 7,516,227, and 8,095,492. (c) 1999-2016