SecureG is a comprehensive security solution designed specifically for high security environments. It provides a secure platform for data transfer and verification, enabling the protection of critical infrastructure against cyber threats, taking into account ISO 27001 security standards and KRITIS requirements.
Securely scan and manage external drives
Ensure secure data transfer between different network segments
Provide a security gateway to protect against cyber threats
An effective cyber security strategy must include a number of key components in order to withstand the increasing complexity of cyber threats.
SecureG is based on a robust technical architecture that enables the integration of multiple layers of security. Key components are the SecureG Backend Server and the Analysis Backend Server, which are responsible for data analysis and centralised control. The solution supports various hardware options, from large kiosks to mobile clients.
The Analysis Backend integrates several leading anti-virus solutions including Kaspersky, Avira, ClamAV, MS Defender, Sophos, ESET and Bitdefender. This multi-scanning strategy increases the likelihood of detecting threats as different AV engines have different strengths.
With Glasswall technology, the Analysis Backend removes potentially harmful content from files while preserving the original file structure. This ensures that only safe content enters the network.
Files are executed and monitored in isolated environments (sandboxes) to determine if they behave maliciously. This enables detection of threats that traditional AV scanners may not be able to detect.
Optional integration of Virustotal services, which scan files against a wide range of antivirus engines and security vendors. This provides an additional layer of security and a more complete threat picture.
The Analysis Backend uses advanced threat intelligence and analysis to identify current threats and take appropriate action. This includes the detection of zero-day exploits and other advanced threats.
The entire system is based on a zero-trust security model, where no file is considered trustworthy until it has been fully vetted and deemed secure.
Customisable rules and parameters allow flexible and precise control of analysis processes to meet specific security and compliance requirements.
An easy-to-use touch screen application for secure transfer of removable media to and from the corporate network (e.g. USB-to-USB, USB-to-network and download-to-USB).
A lightweight Windows application that provides an Explorer-like interface to access the SecureG solution. Distribution and updating is done via ClickOnce, which does not require administrator rights.
Offers the same functionality as the desktop application, but without the need for a dedicated client installation.
A Windows service that protects local USB ports against the use of unauthorised storage devices. This means that only USB devices marked as secure can be used.
SecureG's Analysis Backend combines multi-AV scanning, Content Disarm & Reconstruction (CDR) and sandboxing to thoroughly scan and clean files. These technologies work together to detect and neutralise threats by removing malicious content. The system is highly customisable and supports multiple antivirus solutions for comprehensive protection.
A third-party application with SecureG integration for automatic file transfers and integration with other protocols and services.
SecureG can be deployed not only as a complete SecureG Analysis Backend in an existing IT infrastructure, but also as a standalone or as one or more integrated data locks. With great flexibility we support a wide range of logical use cases. Talk to us about your setup and the benefits of the SecureG Data Lock Kiosk.
SecureG provides a seamless and efficient workflow for managing your security processes. With automated checks and centralised data management, you can detect threats early and take immediate action. SecureG's intuitive user interface allows your teams to work quickly and effectively without losing sight of the big picture.
By combining sandboxing, multi-AV scanning and CDR, SecureG provides comprehensive protection against threats.
The solution can be tailored to meet specific customer requirements, including custom hardware solutions and branding options.
Simple and intuitive user interfaces for kiosk terminals, desktop and web applications.
i2solutions is your strategic partner, providing comprehensive support and consultancy services to fully meet your security requirements. Our experts have many years of experience in industrial IT security and can help you improve your IT security and ensure smooth, trouble-free operations.
We invite you to seek advice from our experts.
Please use our contact form or call us:
+49 (0) 2402 102994 - 0
We look forward to hearing from you.