Products Archives - Trusted Systems - Endpoint Security Solutions Securing Classified Communications Thu, 16 Nov 2023 23:58:55 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.5 https://staging.trustedsys.com/wp-content/uploads/2023/03/cropped-2023-safe-favicon-1000x1000-1-32x32.png Products Archives - Trusted Systems - Endpoint Security Solutions 32 32 Pegasus: Can a Beast be Tamed https://staging.trustedsys.com/pegasus-can-a-beast-be-tamed/?utm_source=rss&utm_medium=rss&utm_campaign=pegasus-can-a-beast-be-tamed Sun, 08 Oct 2023 21:55:00 +0000 https://staging.trustedsys.com/?p=504857 Storytellers have delighted early audiences with tales of a winged stallion that carried heroes to confront challenges and achieve legendary feats. Its name, Pegasus, became synonymous with miracles, extraordinary power, and boundless freedom. Today, however, the utterance of 'Pegasus' is no longer about celestial flight but about a covert infiltration into our digital lives, turning our most personal devices against us in a story that's as real as it is chilling.

The post Pegasus: Can a Beast be Tamed appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

Majestic Myth to Modern Menace

In a world where ancient legends intersect with digital realities, the tale of Pegasus takes on new, perilous dimensions.

Storytellers have delighted early audiences with tales of a winged stallion that carried heroes to confront challenges and achieve legendary feats. Its name, Pegasus, became synonymous with miracles, extraordinary power, and boundless freedom. Today, however, the utterance of ‘Pegasus’ is no longer about celestial flight but about a covert infiltration into our digital lives, turning our most personal devices against us in a story that’s as real as it is chilling.

 

Past or Present, Pegasus Provokes Intrigue  

Once upon a time, the name Pegasus evoked images of a magnificent, winged creature soaring through mythological skies. A symbol of divine favor and infinite potential. But today, “Pegasus” conjures feelings of unease. It no longer represents a mythical beast but a malicious software—spyware—that turns our phones into stealthy eavesdroppers capable of leaving chaos in its wake.

 

The Unbridled Threat

In mythology, Pegasus was a beacon of hope. But today’s digital Pegasus is its opposite: a silent, invasive force.

In mythology, Pegasus was a beacon of hope. But today’s digital Pegasus is its opposite: a silent, invasive force. This isn’t just another malware. It’s an advanced spy tool available for purchase, infiltrating even the most fortified devices, regardless of the user’s stature.

The audacity with which this software operates is confounding. It can activate a device’s microphone or camera without the slightest indication, turning a trusted device into a surveillance tool.

This software ushers espionage into our daily lives.  Imagine a tool that can silently record video, overhear conversations, and observe anything near your phone.  Such intrusive capabilities were once mere fiction. But now, they’re an alarming reality.

In this age of smartphone pervasiveness, the extensive reach of Pegasus and similar spyware poses a significant threat to our cherished privacy. Such insidious intrusions underscore our vulnerabilities. However, despite these daunting challenges to our privacy, the solution lies in adopting a proactive defense that embodies the spirit of ‘Security Made Simple’.

 

Taming the Beast

In myths, heroes used divine tools to tame Pegasus. But given the rarity of divine tools in our mortal world, we need more.  We need groundbreaking solutions to curb the rowdy disposition of the modern Pegasus.  Enter Trusted Systems and their noble ally, Privoro.

Privoro earned a prominant position in the cybersecurity landscape with their proven tools specifically designed to counter threats like Pegasus. Their standout product, SafeCase™**, is more than protection—it’s a fortress. It ensures that even compromised devices can’t be exploited, neutralizing threats before they can act.

Privoro SafeCase

The Shielded Redemption

Our defense against digital threats like Pegasus requires understanding and technological prowess. The vast surveillance capabilities of Pegasus underscore a pressing concern: our personal boundaries are continually tested. But there’s hope, embodied in solutions like SafeCase.

While digital ecosystems grow more intricate daily, SafeCase offers multilayered protection. It doesn’t merely defend; it preemptively shields, keeping surveillance attempts at bay. In this age, redemption isn’t poetic—it’s practical. And with tools like SafeCase, we’re not only defending; we’re asserting our right to privacy.

A New Dawn

Dawn has always signified fresh beginnings. As we navigate the digital era, with its blend of opportunities and challenges, innovations like SafeCase offer a glimmer of hope. And while Privoro brings cutting-edge solutions, the commitment to protection is part of a legacy. Trusted Systems has always championed proactive defense, ensuring security at every digital touchpoint.

SafeCase is a testament to this ethos. It’s not just about defense but anticipating challenges. In this evolving landscape, as threats emerge, so do our protective measures. Every challenge propels us to new levels of innovation, taming both the mortal and digital menace, and aiming for a world where every new day is more safe than the last.

 

** SafeCase™  is a registered trademark of Privoro, LLC.

The post Pegasus: Can a Beast be Tamed appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
SIPRGuard User Authentication https://staging.trustedsys.com/siprguard-user-authentication/?utm_source=rss&utm_medium=rss&utm_campaign=siprguard-user-authentication Tue, 03 Dec 2019 01:21:48 +0000 http://staging.trustedsys.com/?page_id=737 SIPRGuard User Authentication Multi-Factor Authentication for Classified Networks SIPRGuard: The New Standard for Security and Convenience Desktop User Access Control System Secures the Last 6 feet to the Desktop SIPRGuard streamlines network access from the desktop without compromising security, convenience or performance. SIPRGuard uses two-factor (PIN & Fingerprint) authentication to connect the desktop KVM and […]

The post SIPRGuard User Authentication appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

SIPRGuard User Authentication

Multi-Factor Authentication for Classified Networks

SIPRGuard:
The New Standard for Security and Convenience

Desktop User Access Control System Secures the Last 6 feet to the Desktop

SIPRGuard streamlines network access from the desktop without compromising security, convenience or performance.

SIPRGuard uses two-factor (PIN & Fingerprint) authentication to connect the desktop KVM and Ethernet devices to the network equipment mounted inside a Trusted Systems IPS Container (CAA equivalent).  This authentication precedes and is in addition to the normal SIPR token login without the need to open the IPS Container.

SIPRGuard consists of three modules:  Desktop ModuleControl Module and Gateway Module, the latter two secured inside the IPS Container.

Users are enrolled using the Desktop Module. Once the user is validated in the Control Module, signals are transmitted through the Gateway Module to the desktop peripherals. Then, normal SIPRNet token login commences.

To disconnect, the user simply removes their SIPR token, presses the OFF button on the Desktop Module and walks away. If the user leaves the desktop without pressing the OFF button, a time-delayed motion sensor kills the circuit automatically.

The Control Module supplies power to all other modules, backup manual ON/OFF control and motion sensor management.

SIPRGuard Features & Benefits

Simplicity and Convenience

  • Biometric fingerprint & PIN authentication on desktop
  • Accommodates up to 2,000 users
  • ON/OFF control of all desktop devices: KVM, VOIP, VTC
  • Desktop access to SIPRNet without opening IPS Container
  • Instant SIPRNet access without bootup delays
  • Scalable for multiuser, multidomain & multimedia

Security and Compliance

  • Assures DISA STIG and CCRI compliance
  • Network devices remain in IPS Container and on-line 24/7
  • Antiviral patches always up to date
  • Supplemental to SIPR token login
  • Local admin & enrollment
  • Restricts access to network devices inside IPS Container

Performance and Reliability

  • No off-line storage of hard drives, laptops or crypto keys
  • Networks centralized, improved availability & readiness
  • Reduces human intervention by users, techs & guards
  • Minimal power cycling increases hardware reliability
  • On-line 24/7 improves network stability & performance

Applications

  • SIPRNet sites, offices or cafes
  • Executive/GOQ’s and offices (with INCOGNITO cabinetry)
  • Multidomain sites, conference & training rooms
  • Thin or zero client networks
  • Mixed nationality environments
ModelDescription
TSSPG-BCDesktop/Control Modules
TSSPG1-EXPKVME Gateway Module (1x HDMI, 1x USB, 1x Ethernet)
TSSPG2-EXPEthernet Gateway Module (3 port Ethernet)
TSSPG-RMK1U1U Rack Mount Shelf with whale tail zip tie cable retention

Dimensions:

Desktop Module:6.7” H x 3.6” W x 5.6” D
Gateway Module:1.6” H x 8.43” W x 6.75” D
Control Module:1.6” H x 8.43” W x 6.75” D
1U Rackmount Tray:1.7” H x 18.9” W x 11.75” D

Input Power:
100-250VAC, 50-60 Hz, IEC-320-C14, 6ft C13 to NEMA 5-15 power cord included

Environmental:
Operating Temperature 0°C to 50°C (32°F to 122°F)
Storage Temperature -20°C to 60° C (-4° to 140° F)

Standard Cable Sets:
Input: 6ft HDMI/USB/Cat6
Output: 15ft HDMI/USB/Cat6

  • 30ft & 50ft output cable sets
  • Up to 6 Gateway Modules can be daisy-chained from a single Desktop/Control Module
  • 3 Port Ethernet Gateway Module
  • Internal Manual On/Off only Model
  • SafeGuard Monitor Interface Module
  • 4 Port KVM Switch with cables for SIPR, NIPR and/or other networks
  • USB Keyboard/mouse and HDMI Monitor combinations

Compliant, Convenient
Simple & Secure

Play Video

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we work so closely with you to assess your requirements and tailor solutions specific to your needs. If you would like to speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post SIPRGuard User Authentication appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
IPS Accessories https://staging.trustedsys.com/ips-accessories/?utm_source=rss&utm_medium=rss&utm_campaign=ips-accessories Tue, 03 Dec 2019 01:13:19 +0000 http://staging.trustedsys.com/?page_id=729 IPS Accessories Trusted Systems Certified Customizing Accessories Easily Configured to Your Specifications Trusted Systems offers a complete line of options and accessories designed to optimize functionality and performance of your IPS Container. Gallery Factory Installed Options Accessories Factory Installed Options IPS 2.0 with SafeGuard Roll-out Rack Frames Slide-out Racks PDS Conduit Junction Boxes Enlarged Cable […]

The post IPS Accessories appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

IPS Accessories

Trusted Systems Certified Customizing Accessories

Easily Configured to Your Specifications

Trusted Systems offers a complete line of options and accessories designed to optimize functionality and performance of your IPS Container.

Gallery

  • IPS 2.0 with SafeGuard
  • Roll-out Rack Frames
  • Slide-out Racks
  • PDS Conduit Junction Boxes
  • Enlarged Cable Entry
  • Red-Black Separation
  • TEMPEST Enclosure
  • Extreme Climate IPS
  • Enclosures (ECLIPS)
  • Sliding and Stationary Shelves
  • Thermostatic Fan Controller
  • Noise Reducing Mufflers
  • Laptop Storage Trays
  • Cable Management
  • TSM131 Weight Ballast
  • Caster Bases
  • Support Stands
  • Floor-load Spreader Plates
  • Lockable Storage Drawers

Document Downloads

Rack Shelving and Accessories

  • Slide Shelves
  • Fixed Shelves
  • Cable Management
  • Locking Storage Drawers
  • Laptop Storage Trays
  • Rack Extension Kits
  • Cage Nuts and Screws

Cable Connectivity

  • PDS Conduit Junction Boxes
  • Enlarged Cable Entry
  • Red-Black Separation
rack-mount-power-strip

Power

  • World Outlet Adapters
  • Step-Down Power Adapter, 230V to 120V
  • Rack-mount Power Strips
roll-out-rack

Floor Loading and Placement

  • Caster Bases
  • Support Stands
  • Floor-load Spreader Plates
  • TSM131 Weight Ballast

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we methodically assess your requirements and tailor solutions specific to your needs. To speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post IPS Accessories appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
TEMPEST Shielded IPS Enclosure https://staging.trustedsys.com/tempest-shielded-ips-enclosure/?utm_source=rss&utm_medium=rss&utm_campaign=tempest-shielded-ips-enclosure Tue, 03 Dec 2019 01:12:46 +0000 http://staging.trustedsys.com/?page_id=727 TEMPEST NSA Compliant EMI/RFI Shielding TEMPEST IPS Container (TIPS) Trusted Systems produces a Full TEMPEST IPS (TIPS) Container for the shielding of non-TEMPEST rack mounted electronics in high threat classified applications. It combines the physical protection of the IPS Security Container with the highest performance shielding available in a TEMPEST enclosure. The TIPS Container provides […]

The post TEMPEST Shielded IPS Enclosure appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

TEMPEST

NSA Compliant EMI/RFI Shielding

TEMPEST IPS Container (TIPS)

Trusted Systems produces a Full TEMPEST IPS (TIPS) Container for the shielding of non-TEMPEST rack mounted electronics in high threat classified applications. It combines the physical protection of the IPS Security Container with the highest performance shielding available in a TEMPEST enclosure.

The TIPS Container provides broadband EMI/RFI protection for the entire rack, freeing the user from cost and performance constraints of individually shielded devices. Any combination of devices can be shielded whether COTS, zoned or TEMPEST, enabling complete configuration flexibility regardless of changes in hardware, technology or security landscape.

Depending on shielding requirements, Trusted Systems can provide solutions that meet or exceed NSA specification 94-106 levels.

Gallery

Standalone TEMPEST Enclosure (STE)

When physical protection is not required, Trusted Systems offers standalone enclosures that provide the same broadband EMI/RFI shielding without the physical barrier of the IPS Container. Four models are offered providing a variety of depths and heights up to 42U rack space.

EMP / HEMP Shelters

Trusted Systems’ TIPS Security Container is also an effective hardened shelter against Electromagnetic Pulse (EMP) or High-Altitude Electromagnetic Pulse (HEMP) threats. They can be used to shield on-line or off-line equipment such as network devices, radios or communications gear or power distribution equipment to reconstitute operations following an EMP attack or event.

  • EMI / RFI Shielding
  • NSA 94-106 Compliant
  • On-line 24/7 Access
  • Closed-door Operation
  • Fully Accessible Rack
  • TIPS up to 28U rack
  • Standalone up to 42U rack
  • Removable I/O Panel
  • Fiber Barrel Waveguides
  • Full TEMPEST Power Filter
  • High Threat Overseas Locations
  • Alternative to Facility Build Outs
  • EMP / HEMP Shelters
  • RF Radio Shielding
  • Compartmented TS/SCI

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we methodically assess your requirements and tailor solutions specific to your needs. To speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post TEMPEST Shielded IPS Enclosure appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
Secure Computer Cabinets https://staging.trustedsys.com/secure-computer-cabinets/?utm_source=rss&utm_medium=rss&utm_campaign=secure-computer-cabinets Tue, 03 Dec 2019 01:11:55 +0000 http://staging.trustedsys.com/?page_id=725 Trusted Systems Secure Computer Cabinets Prevent Theft, Vandalism, and Unauthorized Data Access Is your PC safe? If not, is the data worth protecting in 100-pounds of welded steel?  Protect your vital CPUs and servers   Provide secure, unattended operation   Prevent unauthorized access to USB ports & hard drives   Tamper-evident finish reveals attempts of covert […]

The post Secure Computer Cabinets appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

Trusted Systems
Secure Computer Cabinets

Prevent Theft, Vandalism, and Unauthorized Data Access

Is your PC safe?
If not, is the data worth protecting in
100-pounds of welded steel?

  •  Protect your vital CPUs and servers
  •   Provide secure, unattended operation
  •   Prevent unauthorized access to USB ports & hard drives
  •   Tamper-evident finish reveals attempts of covert access
  •   Quiet, thermostat-controlled cooling regulates temperature
  •   Easy-slide tray simplifies maintenance
  •   Standard 2-year warranty ensures reliable operation
  •   Customization options available for your application

Gallery

Current events often highlight the vulnerability of your vital CPUs and servers. When stolen, it’s not the computer they want… It’s the information.

Mission-critical computers need protection from unauthorized data access, vandalism, accidental damage, and theft.

News reports provide the frequent reminder that a primary target of thieves and disgruntled employees is your data.  Whether it’s a threat from an unauthorized insider who’s hell-bent on copying data through a USB port, or an outsider’s scheme for a smash-n-grab,  a Trusted Systems’ Secure Computer Cabinet is protection you can trust.

The feature-rich design of a Secure Computer Cabinet includes precision-welded, 16-gauge steel construction enclosed by a high-security, cam-lock door system, all coated with a dual-purpose, textured powder coat to provide a tamper-evident finish while enhancing heat dissipation.  The stature of this imposing computer enclosure announces a formidable barrier to internal surreptitious actors, as well as, professional thieves.

Among the standard features in a Secure Computer Cabinet are a built-in, thermostat-controlled cooling system, onboard power strip, secure cable ports, and a 2-year warranty to ensure trouble-free, closed-door operation.

Trusted Systems Secure Computer Cabinets are perfect for added security within government/contractor SCIF environments where a GSA class 5 IPS container is not required.

Notable Differences to Other Computer Enclosures:

  • Welded construction means there are no seams that expose pry points.
  • No exposed rivets or screws that can be easily drilled or chiseled out.
  • No line-of-sight openings to the internal components.
  • Secure cable-feed ports prevent direct access to internal devices.
  • High-security door mechanism locks all four sides with non-visible steel bars preventing access even if hinges are compromised.
  • High-security Assa Abloy pick-proof cam lock prevents master-keying.
  • Standard, built-in thermostatically-controlled cooling maintains a controlled internal operating environment.
  • Standard, side-mounted, 5-port power strip assists cable management, minimizing external leads.
  • Standard slideout tray with mounting options for rack-mounted devices.

Features

  •   Precision-Welded 16GA Steel
  •   High-Security Cam Lock Door System
  •   Built-in Automatic Cooling System
  •   Built-in Sound Suppression
  •   Integrated 5-Plug Power Strip
  •   Secure Cable Management Ports
  •   Sliding Tray to Simplify Maintenance
  •   Custom Configurations Available
  •   Cost Effective & Transportable

Datasheets/Brochures

Specifications

Model NumberTSC-TRCC-C
Outside Dimensions27.6”H x 15”W x 35.3”D
Slide Shelf Dimensions12.38”Wx22”D, removable
Door Opening26.5”H x 13.88”W
Cable Openings2ea 2.25”H x 4.5”W
Power115VAC, 50/60Hz, 20W (cooling system)
Cooling170cfm max, front to back airflow, temp controlled
Noise Level42dB max
Weight100 lbs.

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we work so closely with you to assess your requirements and tailor solutions specific to your needs. If you would like to speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post Secure Computer Cabinets appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
Incognito Concealed Workstations https://staging.trustedsys.com/incognito-concealed-workstations/?utm_source=rss&utm_medium=rss&utm_campaign=incognito-concealed-workstations Tue, 03 Dec 2019 01:11:20 +0000 http://staging.trustedsys.com/?page_id=723 Incognito We Put the ‘Class’ in Classified What is ‘Incognito‘? Incognito is a custom built, fully functional classified workstation camouflaged to match its surroundings. The Incognito Classified Workstation is designed to conceal the IPS Container, classified IT equipment and the presence of a classified communications node or connection. It’s a security countermeasure to conceal classified activity from prying eyes of guests […]

The post Incognito Concealed Workstations appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

Incognito

We Put the 'Class' in Classified

What is 'Incognito'?

Incognito is a custom built, fully functional classified workstation camouflaged to match its surroundings. The Incognito Classified Workstation is designed to conceal the IPS Container, classified IT equipment and the presence of a classified communications node or connection. It’s a security countermeasure to conceal classified activity from prying eyes of guests or uncleared co-workers. This is especially desirable in high profile sites such as GOQs, headquarters offices and conference/training rooms.

Incognito is the 'Class' in Classified

Incognito is built to the exact specifications of the room size and décor and can be custom designed to match any existing office furniture. It’s hand-crafted, high quality construction uses cherry, mahogany, walnut, maple or oak. In addition, we also offer a modular design for common office spaces and cubicle environments.

Gallery

  • Camouflage for the Office
  • Concealed Quiet Operation
  • Instant Convenient Access
  • Alternative to Facility Build Outs
  • Multifunctional Design
  • Custom Styles & Wood Stains
  • Fast & Easy Installation
  • Optional Matching to Decor
  • Intrusion Protection Available
  • High Profile Locations
  • General Officer Quarters
  • Ambassador Residences
  • Embassies & Consulates
  • Governor/AG Offices
  • Senior Executives
  • Conference/Training Rooms

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we work so closely with you to assess your requirements and tailor solutions specific to your needs. If you would like to speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post Incognito Concealed Workstations appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
SafeGuard IPS Security https://staging.trustedsys.com/safeguard-ips-security/?utm_source=rss&utm_medium=rss&utm_campaign=safeguard-ips-security Tue, 03 Dec 2019 01:09:08 +0000 http://staging.trustedsys.com/?page_id=719 SafeGuard IPS Container Monitor 24/7 Real-Time Intrusion Protection Gallery What is SafeGuard? SafeGuard is the next generation of physical protection for classified networks, transforming the IPS Container from a standalone facility-based container to a network-centric security appliance.  SafeGuard integrates intrusion protection into the IPS Container itself: a continuous, real-time, IP addressable monitor and alarm for the IPS lock, […]

The post SafeGuard IPS Security appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

SafeGuard IPS Container Monitor

24/7 Real-Time Intrusion Protection

Gallery

What is SafeGuard?

SafeGuard is the next generation of physical protection for classified networks, transforming the IPS Container from a standalone facility-based container to a network-centric security appliance.  SafeGuard integrates intrusion protection into the IPS Container itself: a continuous, real-time, IP addressable monitor and alarm for the IPS lock, door and connected cables.

Each critical element of the IPS Container and the entire length of cable plant are under constant surveillance with the ability to instantly respond to any threat with an immediate response. This establishes a proactive versus reactive solution.

Instead of just auditing loss or damage, you can now prevent it.

Keeping the Insider Out

The major vulnerability to security is the “insider” who already has access. SafeGuard instantly responds when the lock dial is turned to proactively prevent unauthorized access or compromise in real time.

Alarms trigger an immediate proactive response against any threat by shutting off power to critical equipment; switches, routers, servers, PC’s and encryption devices. 

The human element is minimized, not relying on periodic inspections or OPSEC procedures to ensure compliance.

Monitor – Alarm

SafeGuard monitors and alarms dial rotation, lock status and door position, plus power consumption and internal/external temperature & humidity. 

SafeGuard can also be coupled with an optional vibration sensor and CCTV to thwart external threats.

With CableGuard, using the InterceptorTM alarmed fiber PDS, the entire network cable plant can be monitored end-to-end.

Control - Protect

Upon detecting an alarm condition, SafeGuard transmits email or text alerts to security personnel and SNMP traps to a network performance monitoring system which can provide an automated response or shut-down.

Individual on/off control for [8] receptacles allows instant shutdown of equipment in response to alarms as well as power up sequencing and remote rebooting. This also enables remote “zeroizing” of TACLANE 175D encryption devices.

Responses can be generated as a result of an unauthorized intrusion, disruption of power, equipment failure or overheating due to HVAC failures. Multiple containers can be monitored and controlled simultaneously with an optional dedicated server.

  • Proactive Countermeasures
  • “Zeroize” Crypto Remotely
  • SNMP Traps & Email/Text Alerts
  • End-to-End Intrusion Protection
  • 1U Rack Mounted PDU
  • Environmental Monitoring
  • Remote Power Sequencing
  • 8 Individually Controlled Outlets
  • Central Network Monitoring
  • Verify Security Procedures
  • Available on All IPS Containers
  • No More Ugly PDS Conduit!
  • High Threat Locations
  • Remote Unattended Sites
  • Lock-and-Leave Posts
  • Multi-domain Environments
  • Data Centers
  • GOQ’s and Residences
  • Off-site Contractors

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we methodically assess your requirements and tailor solutions specific to your needs. To speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post SafeGuard IPS Security appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
Network Endpoint Security https://staging.trustedsys.com/network-endpoint-security/?utm_source=rss&utm_medium=rss&utm_campaign=network-endpoint-security Wed, 20 Nov 2019 23:39:36 +0000 http://staging.trustedsys.com/?page_id=696 Network Endpoint Security Neutralize Insider Threats The First Seamless User-to-the-Cloud Infrastructure Protection System. Network Endpoint Security is the union of three distinguished product arenas: IPS Container = The system begins with a GSA Approved, Class 5, non-intelligent physical barrier to protect classified network devices. Trusted Systems’ IPS container is what some in the classified security industry have affectionately […]

The post Network Endpoint Security appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

Network Endpoint Security

Neutralize Insider Threats

IPS-Peanut-Perspective12-600x600

The First Seamless User-to-the-Cloud Infrastructure Protection System.

Network Endpoint Security is the union of three distinguished product arenas:

  1. IPS Container = The system begins with a GSA Approved, Class 5, non-intelligent physical barrier to protect classified network devices. Trusted Systems’ IPS container is what some in the classified security industry have affectionately referenced as a box-sized SCIF.
  2. SafeGuard = Remote, IP-addressable monitor, alarm and control system. SafeGuard is network-centric, instead of facility-centric, and provides proactive threat detection and deterrents, rather than reactive in the wake of a breach.
  3. SIPRGuard = Desktop User Authentication, securing the weakest link in the network; the last 6 feet to the user.   Utilizing the latest techniques in identity recognition, SIPRGuard ensures the human interface is as secure as the rest of the network.

Why Trusted Systems’ Network Endpoint Security?

No.1 Reason to Implement Endpoint Security?

no-wikileaks

Keep the Insider Out

GSA Approved Class 5 IPS Container

040

Endpoint Security Begins with a Strong Foundation

The strength in a system begins in the foundation, and every Endpoint Security solution from Trusted Systems begins with a Class 5, GSA Approved, IPS (Information Process System) security container.

The IPS container is highly configurable, available in numerous sizes, mobile, and proven to be battleship tough.  A broad selection of options are available to fit your exact requirements, to include:

IPS Container Size Options

Multiple Configuration Options

TEMPEST Shielded Security Options

Network Endpoint Security Requires a Proactive Status Monitoring System

Always “On Duty”, never needing a break, and automatically initiating proactive security responses at the slightest detection of intrusion efforts, SafeGuard lets the security officer rest easy knowing the classified network is beyond the reach of malicious intent.

SafeGuard Features:

Optional Configuration:

SafeGuard’s early threat detection capabilities can be enhanced with the addition of CableGuard, incorporating a vibration sensor, CCTV, and the InterceptorTM alarmed fiber PDS.  With CableGuard, SafeGuard becomes a highly sensitive, end-to-end network monitor, able to instantly initiate proactive alarms and – if necessary – shutdown procedures.

With SafeGuard’s hyper-sensitive detection and lethal alarm capabilities, some might think it’s like using a hair-triggered Howitzer to hunt varmints.  However, we believe when it comes to protecting classified information, rats can never be dead enough.

Only Trusted Systems’ Network Endpoint Security Solutions Complete the System with User Authentication

SIPRGuard consists of a desktop module, gateway module, and power control module.

SIPRGuard Secures the Last 6 Feet to the Desktop

With SIPRGuard, an authorized user is restricted to network access only through desktop peripherals, not the network devices.

And inadvertent or malicious unauthorized users are prevented from accessing the network through SIPRGuard’s combination of :

  • Two-factor authentication at desktop (CAC + PIN)
  • User administration from inside IPS container
  • User Proximity detector to automatically disable KVM interface when authorized user walks away from workstation without first logging off
  • Instant-Off Panic button to disable user interface if authorized user detects an unauthorized presence
  • and rapid integration of new technology to neutralize emerging threats

SIPRGuard answers the concern of how to keep the insider out.  Personnel may be authorized for access to a secure facility, but SIPRGuard will prevent access to the network.  And even though an authorized user is allowed access to the network, it is SIPRGuard that prevents their unauthorized access to the network equipment and mass storage devices.

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we methodically assess your requirements and tailor solutions specific to your needs. To speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post Network Endpoint Security appeared first on Trusted Systems - Endpoint Security Solutions.

]]>
IPS Security Containers https://staging.trustedsys.com/ips-security-containers/?utm_source=rss&utm_medium=rss&utm_campaign=ips-security-containers Thu, 26 Sep 2019 23:29:25 +0000 http://staging.trustedsys.com/?page_id=429 GSA Class 5 Security Containers The SCIF-in-a-BoxTM Resource CCRI & DISA STIG Compliance By combining the IPS container with SIPRGuard two-factor user authentication, Trusted Systems helps the owning agency satisfy DISA STIG Finding ID V-31132. Information Assurance – Network Connections – Physical Protection of Classified Network Devices such as Routers, Switches and Hubs (SIPRNet or […]

The post IPS Security Containers appeared first on Trusted Systems - Endpoint Security Solutions.

]]>

GSA Class 5 Security Containers

The SCIF-in-a-BoxTM Resource

IPS Secure Cabinets

CCRI & DISA STIG Compliance

By combining the IPS container with SIPRGuard two-factor user authentication, Trusted Systems helps the owning agency satisfy DISA STIG Finding ID V-31132.

Information Assurance – Network Connections – Physical Protection of Classified Network Devices such as Routers, Switches and Hubs (SIPRNet or Other Classified Networks or Systems Being Inspected)

Overview

Finding ID  Version  Rule ID  IA Controls  Severity

V-31132  IA-12.01.01  SV-41289r2_rule  DCPP-1 EBCR-1 ECND-2 ECTM-2 PESS-1  High

Description

SIPRNet or other classified network connections that are not properly protected in their physical environment are highly vulnerable to unauthorized access, resulting in the probable loss or compromise of classified or sensitive information.

Trusted Systems’ definitive IPS container prevents unauthorized access to communications equipment:
   –  GSA-approved alternative to CAA or facility build-out
   –  Highest level Class 5 physical protection available

Frequently Asked Questions

IPS (Information Processing System) Security Containers are a cost effective alternative to a CAA or facility/SCIF build out, allowing on-line, closed-door, unattended, 24/7 operation of stand-alone or networked classified applications. 

The IPS Container is an armored computer cabinet constructed specifically for the protection and operation of any combination of classified equipment: Type 1 encryption devices, switches, routers, patch panels, servers, workstations, laptops, etc. It’s an integrated security solution that combines physical protection with internal cooling, rack mounting and secured cable connectivity. 

IPS Containers meet the GSA Class 5 protection criteria, the highest level of physical protection as specified under Federal Specification AA-C-2786, having their own distinct blue GSA approval label.

By using an IPS container, authorized users no longer need to rely on full-scale SCIFs to access a classified network.  In essence, an IPS security container enables secure networks to go to the user, instead of the user going to a secure site. 

Trusted Systems offers a multitude of sizes, cooling options, rack mount configurations and cable connectivity layouts. This allows IPS Containers to be small enough for single user or tactical applications, yet large enough for network data centers or large communications nodes, and everything in between.

By using a Trusted Systems IPS Container in a deployment, the owning agency saves substantial cost, time and complexity by eliminating the need to create a separate SCIF or secured equipment room. 

Where a SCIF has a permanent location and fixed size, the Trusted Systems IPS Container is a fully authorized CAA alternative, self-contained, modular, scalable, and most importantly, transportable. This offers a high degree of flexibility for network deployments, upgrades or reconfigurations due to changes in architecture. 

Trusted Systems IPS Containers are more than just storage containers; they protect classified network applications for SIPRNET or JWICS nodes, wireless access points, client workstations, DRSN or VOSIP circuits, VTC connections, server farms, blade clusters, communications closets and laptop repositories. 

In these days with emphasis on joint forces integration and BRAC relocations, this modularity of infrastructure security provides great latitude when relocating networks at minimal cost in a shorter period of time.

SafeGuard transforms the traditional facility-based IPS Container into a network-centric solution with an integrated IP-addressable Intrusion Protection System known as “IPS 2.0 with SafeGuard”. 

Now classified networks can be continuously monitored and controlled remotely with real-time proactive countermeasures against threats from overheating, power disturbances, and most significantly, unauthorized access from insiders and outsiders alike.

TSM131V

IPS Security Container

TSM131WD

IPS Security Container

TSM191D

IPS Security Container

TSM281WD

IPS Security Container

TSM521WX

IPS Security Container

TSM621FWX

IPS Security Container

Related Products

Trusted Systems Integrated Solutions

(video length: 6:17)

Play Video
  •   GSA Approved Class 5
  •   Protection up to TS/SCI
  •   On-line 24/7 Access
  •   Closed Door Operation
  •   Flexible Rack Mounting
  •   Low-Noise Cooling
  •   Contaminant Free
  •   Enhanced Equipment Reliability
  •   PDS Conduit Connectivity
  •   Intrusion Protection
  •   Full TEMPEST Models
  •   Custom Configurations
  •   Cost Effective & Transportable
  •   Alternative to Facility Build-Out or Closed Access Area (CAA)
  •   SIPRNet Nodes & Cafes
  •   JWICS Networks
  •   Tactical/Deployable SIPRNet
  •   Communications Closets
  •   Wireless Access Points
  •   Thin Client Workstations
  •   Blade Clusters
  •   Server Farms
  •   Laptop Charging Repository
  •   Crypto, Radio Storage
  •   VOSIP or DRSN Circuits
  •   VTC Connections
  •   MLS Network Separation
  •   Extreme Climates

Performance is the Result of Commitment Meeting Preparation

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application. This is why we work so closely with you to assess your requirements and tailor solutions specific to your needs. If you would like to speak to a representative, please submit a Quote Request form, or call toll free 800-414-4203.

The post IPS Security Containers appeared first on Trusted Systems - Endpoint Security Solutions.

]]>