Open post

We Launch Data Guard Version 3.12 – An Update for Safer Transfers

We Launch Data Guard Version 3.12 - An Update for Safer Transfers

link22 now launches an updated version of our core product within Secure Transfer, Data Guard. With improved functionality and increased flexibility in version 3.12, we now offer even stronger protection for critical data.

Data Guard - Protection Against Cyber Threats

Data Guard is a central component in link22's offerings within Secure Transfer. The product inspects files and approves or denies them before they enter or leave a system. Data Guard enables secure, controlled, and traceable import of program updates to secure domains. Filters and antivirus programs check files for potentially harmful content.

Enhanced Functionality and Increased Flexibility

Data Guard can also be used to verify and approve which documents are allowed to be exported from sensitive networks. The product is highly flexible and configurable - it comes with a range of filters designed to detect unwanted files, and also allows you to easily add your own filters.

Data Guard 3.12 - A New Era of Cybersecurity

link22 is now launching version 3.12 of the Data Guard product. "We currently have quite a few customers using our Data Guard, both in the private and public sectors," says Marcus Ekbäck, Business Area Manager for Cross Domain Solutions at link22. "The content of our new version is based on requests from our customers, but also improvements that we see make a good product even better."

Protect Your Organisation with Data Guard 3.12

With Data Guard 3.12, you can feel more secure in the knowledge that your company's critical data is protected against cyber threats. Whether you need to ensure the import of program updates or control which documents are allowed to be exported from your network, Data Guard 3.12 is a reliable solution.

To learn more about how Data Guard 3.12 can enhance your organization's cybersecurity, visit our product page for Data Guard.

Read more

Related

Marcus Ekbäck

Contact us!

Marcus Ekbäck
sales@link22.se
+46 13-13 24 00

Sign up for our newsletter!


    Open post

    link22 Launches Diode TCP Connector: Secure Streaming of TCP Data Over Data Diodes

    link22 Launches Diode TCP Connector: Secure Streaming of TCP Data Over Data Diodes

    link22 introduces a new product, the Diode TCP Connector, enabling secure streaming of TCP data over a physical data diode. This innovation provides a secure solution for channeling external data streams into an offline IT environment or exporting sensor data and logs from a power facility.

    Secure Streaming of TCP Data Over Data Diode

    link22 is proud to present our latest product, the Diode TCP Connector. This software allows for the secure transmission of TCP data over a physical data diode without compromising security. The product consists of two applications, one running upstream of the diode and one on the downstream side.

    Use Cases for Diode TCP Connector

    The Diode TCP Connector can be used to securely capture an external data stream and channel it into an offline domain. It can also be used to export sensor data and logs from a power facility through a diode, ensuring that no malicious software can travel in the opposite direction.

    Support for Both UDP and TCP Streaming

    The Diode TCP Connector supports both UDP and TCP data streaming over a diode. The application supports multiple concurrent streams, making it a flexible solution for various use cases.

    link22 – A Pioneer in Data Diode Software

    link22 has long been a pioneer in data diode software. Our software works with all data diodes, regardless of the manufacturer. We have long supported file transfer over a diode, and it is gratifying that we can now also handle streaming TCP data securely and efficiently, says Marcus Ekbäck, Business Area Manager for Cross Domain Solutions at link22.

    To learn more about how the Diode TCP Connector can improve your organization's cybersecurity, visit our product page for Data Diode Zero.

    Read more

    Related

    Marcus Ekbäck

    Contact us!

    Marcus Ekbäck
    info@link22.se
    +46 13-13 24 00

    Sign up for our newsletter!


      Open post
      Marcus Ekbäck

      link22 Recruits Experienced IT-expert – Marcus Ekbäck

      link22 Recruits Experienced IT-expert – Marcus Ekbäck

      link22 is pleased to welcome tech enthusiast Marcus Ekbäck as the new Business Area Manager for Cross Domain Solutions. With a diverse background spanning across various sectors, Marcus' passion for technology and strong leadership will contribute to the company's continued growth and pursuit of a safer society.

       

      Marcus Ekbäck

      Marcus Has a Broad Experience

      link22 is thrilled to introduce Marcus Ekbäck as the new Business Area Manager for the area of Cross Domain Solutions. Marcus, an enthusiastic technologist, will reinforce the team with a broad and versatile experience that spans across several sectors.

      Marcus was born and raised in Hälsingland and has a background in industrial engineering, with a focus on computer science. His interest in technology was sparked early in life when his parents gifted him a Commodore computer, which led him to start experimenting with programming. According to him, his technical direction was a natural choice. His fascination for technology has continued to grow over the years, as evidenced by his passion for home automation and network building.

      Broadband, IP-TV & Composites

      Marcus most recently held a leading position at A-society. His career journey began at Ericsson in Linköping, where he worked with new broadband technologies just as the internet was starting to reach the general public.

      From Ericsson, the journey continued to Motorola, where he took on the role of product leader for one of their IP-TV products. After Motorola, Marcus changed career paths and moved to work for a company manufacturing composites for the defense industry. There, he was head of a project office and also led a large project for an industrial customer.

      Marcus sees his time in sports, specifically tennis, as an important part of his personal and professional development. He believes that his competitive background has taught him the importance of training, patience, and that rewards come to those who work hard. He has taken these lessons from the tennis court into his professional life.

      Technology enthusiast with broad experience

      Marcus most recently comes from a leadership position at A-society. His career journey began at Ericsson in Linköping, where he worked with new broadband technologies just as the internet began to reach the general public. From Ericsson, he moved on to Motorola, where he assumed the role of product manager for one of their IP-TV products.

      Throughout his career, Marcus has built long and deep customer relationships in connection with complex deliveries of high-tech products. His experience, success, and focus on customer benefits are well suited for link22, where the relationship with the customer is important. Delivering components and technology to secure critical infrastructure and citizen's privacy imposes higher demands on cooperation.

      Working Hard Together

      When asked what he finds enjoyable about work, Marcus responds: "When you work hard together towards a goal, when you support each other, and when you reach that goal together! It's also fun when you compete against competitors.”

      Marcus joins link22 with a strong passion for technology, a commitment to collaboration, and a strong drive to create value for all parties involved. These qualities, coupled with his experience from companies like Motorola, Ericsson, and A-society, make him an excellent fit for the role of Business Area Manager.

      We welcome Marcus to the team and are confident that he will be a strong asset in the company's ongoing journey towards a safer society.

      We are growing and constantly looking for more employees. If you, like Marcus, are seeking a meaningful and challenging job, we would be happy to receive your application.

      Read more

      Related

      Was the article valuable?

      Sign up for our newsletter!


        Do you want to know more?

        Marcus Ekbäck
        sales@link22.se
        +46 13-13 24 00

        Marcus Ekbäck
        Open post
        säkerhetsprodukt link22

        Three government security challenges solved with data diodes

        Three government security challenges solved with data diodes

        Appropriate data security

        As government authorities are becoming more vulnerable to various types of cyberattacks, it is crucial to prioritize cybersecurity and implement systematic measures to protect against these threats. An important aspect of cybersecurity is selecting the appropriate solutions, such as data diodes, which are designed to withstand attacks and provide a high level of security for sensitive information. By utilizing data diodes, government authorities can effectively address a range of IT security issues and ensure the protection of data security.

        The data Diode

        A data diode is a cybersecurity solution that utilizes one-way-communication to exchange information. This hardware product provides high assurance in maintaining the integrity of networks by preventing intrusions, while also protecting sensitive information through maintaining network confidentiality. Data diodes are an important part of any comprehensive cybersecurity strategy.

        säkerhetsprodukt link22

        Data diode or Firewall?

        When it comes to protecting sensitive or classified information from leakage or manipulation, one common solution is to completely disconnect it from other networks. However, there may be times when data needs to be transferred to or from the protected network. In these cases, a firewall may not be sufficient for improving cybersecurity. While a firewall can help protect the network by only allowing certain traffic through, a high assurance supplement in the form of a Cross Domain Solution (CDS) may also be necessary. A CDS, like a data diode, helps to maintain secure information exchange between domains with different security or protection needs. Data diodes, specifically, are a type of CDS that facilitate communication, sharing, or movement of information between domains while also applying validation, transformation, or filtering to the exchange.

        Secure File Transfer

        One use of data diodes for government authorities is secure file transfer. When transferring important information from a high-security system to a lower-security administrative office network, there is a risk of security breaches. However, by using a data diode to send the data from the high-security network to the lower-security network, the information can be transmitted safely while maintaining the integrity of the high-security network. The data diode ensures that no one can use the same connection to access the sensitive network and potentially manipulate it while also protecting the sending domain.

        Learn more about the functions of data diodes here.

        Using data diodes for traceability and logging in security-sensitive operations

        Centralized log collection in security-sensitive systems can increase the risk of attacks. To mitigate these risks, a solution is needed that protects both log information and all connected systems.

        Many IT systems generate logs that allow for troubleshooting and traceability. To maximize the usefulness of these logs, it is important to collect logs from as many systems as possible into a central system for storage and analysis.

        If you have security-sensitive or zoned systems and want to implement centralized log collection, you must consider the inherent goal conflict. Logging benefits from having a common system for all zones/subsystems, but a common system increases the risk of various types of attack and the risk of information leakage between the supervised systems.

        Data diodes can provide powerful protection for centralized log collection. Each zone that delivers log information is protected with a data diode. The data flow is unidirectional towards the log system. This allows for the use of a common log system, regardless of the number of zones that deliver data to it. 

        Read more about logging and CDS here.

        Welcome Henrik Nilsson!

        Secure Updates

        As the use of Windows and/or Linux based systems within ICS/SCADA has grown, the need to update these systems has become more pressing. This is because complex software often contains bugs that need to be fixed in order to maintain system stability and security.

        However, if not done properly, the process of updating can itself pose a security risk. The integrity and availability of the systems must be maintained, and most system updates are not adequately evaluated in the environment in which they are used or in combination with the applications that are running.

        One way to securely perform updates is by using a data diode to ensure one-way communication. The data diode is connected in such a way that information can be imported into the system, but since no traffic can be transmitted in the opposite direction, information leakage is prevented.

        We know the in and outs of data diodes from a cybersecurity point of view. Please do not hesitate to ask us anything.

        Book a demo or a meeting here.

        Welcome Henrik Nilsson!
        Open post
        sections consulting services

        The NIS2 Directive

        What is the NIS and NIS2 directive?

        The article is an introduction to the NIS directive and the NIS2 directive, aiming to strengthen the EU's protection of critical infrastructure. We briefly go through what the directive means in practice and who is affected. We help businesses manage security challenges with tailored solutions. Book a demo to discuss how NIS affects you and what measures you may need to take.

        Secure cloud system with link22

        About the NIS directive

        (The Directive on security of network and information systems) The purpose of the NIS directive is to heighten the security levels for critical infrastructure in the European Union.

        link22 and the NIS Directive

        The NIS Directive affects each company and organization differently, there is no one-size-fits-all solution to meet the requirements and stay efficient. It can be hard to assess whether or not the NIS Directive affects your company at all. We have helped governments, organizations and companies with challenges like this for 16 years and can be of use in many ways. It can seem complicated to determine what this means for you; what are you obliged to do or not to do? If you are unsure about this we suggest that you book a demo with us where we make an assessment together. Based on your situation we reason together and specify what you need to do to meet the new requirements and most importantly to secure what's valuable in your possession.

        What does the term “directive” mean in this context?

        It means that it can be incorporated differently in every member state to functionally harmonize with local legislation. In Sweden, the NIS-directive came into force on august the first in 2018 though The information security law.

        Why does the NIS directive exist?

        The NIS-directive was created to protect european citizens by heightening security around critical infrastructure within the member states. Specifically by improving information security related to critical infrastructure.

        Digitalization gave rise to NIS and NIS2

        The number of hacker attacks from criminal organizations and nation states has increased significantly. Attacks are more sophisticated and so are the motifs. Hackers are not just in it for money, elections and national security is also at stake. Cyberwar is a fact. There is good reason to prevent and prepare for attacks to keep critical infrastructure intact. The NIS and NIS2 directive is ultimately meant to serve european citizens.

        The NIS directive affects certain industries

        Energy, health care, transport, finance, water supply and digital infrastructure are considered critical according to the NIS directive. Companies and organizations within these sectors are obligated to secure their information according to the NIS directive.

        The NIS directive in reality

        The NIS directive means generally stricter security requirements around information security. Concerned entities must consider people, process and technology when securing information. They need to classify information and systems. These entities must also prepare for the eventualities that an attack may lead to and specify action plans to increase resilience. Continuous knowledge gathering by incident reporting is mandatory with the purpose of always becoming more prepared. Companies and organizations are expected to direct their NIS-related actions towards network and information-systems.

        The NIS2 Directive

        To oblige- and benefit by the NIS-directive

        The NIS directive is a useful place from which to start making valuable cybersecurity improvements. Best practice in this case may be to first create an overview of the organization as a whole and then extract potential and useful changes in order to improve information security. Some processes are crucial for core functionality, some individuals have access and responsibilities that make them targets for extortion and some parts of the technical infrastructure are more vulnerable than others. This is properly complemented by an external assessment of the external cybersecurity landscape, specifically what kind of attacks that are common and what kind of attacks that may become common in the future. Information transfer between security domains and/or networks are, for example, one of the most exposed and vulnerable situations in cybersecurity today. Implementation of data diodes, countersign and encryption are three actions that will make a significant difference for many organizations in the coming years. Separate domains for different security levels is a good idea that can be implemented when one has specified what information is more important than the other. A clear information hierarchy is necessary to maintain efficiency and security.

        The NIS-2 directive to improve the NIS directive

        The NIS directive includes continuous review to ensure incremental improvements and adaptations to meet the change rate of the digital world. This has resulted in NIS 2.

        Identified weaknesses

        • European companies do not have sufficient ability to defend themselves against cyber attacks
        • European companies do not have sufficient ability to stay operational during a cyberattack
        • European companies do not have sufficient ability to return to normal functionality after a cyberattack
        • Some sectors and states are significantly stronger than others, the European digital landscape has obvious weaknesses
        • The cyber threat awareness among EU member states is low
        • There are no common crisis management practices regarding cyberattacks within the EU

        Improvements through the NIS 2 Directive

        The NIS directive has been extended to further enhance security. Here are some of the most important add ons:

        • New sectors have been added
        • Increased minimum security and reporting requirements
        • Stricter supervisory measures for nation authorities
        • Stricter compliance requirements for nation authorities
        • Administrative fines has been made possible
        • Increased cooperation and increased information sharing between Member States' authorities

        The NIS2 Directive affects more entities

        NIS2 covers more sectors and more companies and organizations within each sector. The original NIS-directive considers energy, healthcare, transport, finance, water supply and digital infrastructure as critical for a functional society. With NIS2, public administration, pharmaceutical production, critical medicine technology and space has been added to the list.

        The NIS2-directive also affects sectors in the periphery of critical infrastructure, these include; waste disposal, chemicals, post service, food, motor vehicles, production of medical machines, computers and electronics, machine equipment and digital suppliers

        The majority of affected entities are medium and large enterprises within the above mentioned sectors but some small companies may also be affected depending on their profile.

        link22 and the NIS Directive

        The NIS Directive affects each company and organization differently, there is no one-size-fits-all solution to meet the requirements and stay efficient. It can be hard to assess whether or not the NIS Directive affects your company at all. We have helped governments, organizations and companies with challenges like this for 16 years and can be of use in many ways. It can seem complicated to determine what this means for you; what are you obliged to do or not to do? If you are unsure about this we suggest that you book a demo with us where we make an assessment together. Based on your situation we reason together and specify what you need to do to meet the new requirements and most importantly to secure what's valuable in your possession.

        Read more

        Related

        Was the article valuable?

        Sign up for our newsletter!


          Do you want to know more?

          Helena Gällerdal Högfeldt
          sales@link22.se
          +46 13-13 24 00

          Helena Gällerdal Högfeldt
          Open post
          Secure Transfer 3.9

          Product Launch – Secure Transfer 3.9

          Product Launch - Secure Transfer 3.9

          Secure Transfer 3.9

          We are proud to announce the launch of Secure Transfer 3.9. Transferring information in a secure way is now faster, more reliable and easier to use than ever before. Our engineers have made the product smarter and more powerful to further push the limit for cybersecurity.

          It is smarter to do more with less. The new Flow Priority Agent helps to configure priorities between transfer flows. We know there will always be more data than bandwidth and it is therefore inevitably a question of what to prioritize.

          I/O bound filters to optimize even further. Secure Transfer 3.9 make the most out of the CPU capacity by using intelligent I/O bound filters.

          Built for humans first. The world we are building is not for machines, it is for humans. This is why we have made user interface improvements in all user applications.

          Major new functions:

          • Flow Priority Agent
          • I/O bound filter optimization
          • Improved user interface in all user applications
          • New configuration parameters for Active Directory certificate mappings
          • Improved log messages
          • Enhanced stability and reliability

          Read more about Secure Transfer 3.9 and how to apply it here.

          Request a demo for Secure Transfer 3.9 here.

           

          Open post
          Data Diode Proxy 3.3

          Product Launch – Data Diode Proxy 3.3

          Product Launch - Data Diode Proxy 3.3

          Data Diode Proxy 3.3

          We are excited and proud to announce the launch of Diode Proxy 3.3. Our reliable and highly configurable diode proxy has been improved to continue to be at the forefront of cybersecurity. It is for us a crucial part of a useful and secure IT-system.

          Fast and steady. The Diode Proxy 3.3 is faster and more reliable with a default speed of 900 Mbit/second.

          Enhanced control. The 3.3-version allows for certificate requests to be generated from Control Center. Transfer flows are now configurable and folders can be saved down to a desired level.

          Useful anywhere. The Diode Proxy has always supported a wide range of network protocols and can be run on both a physical and virtual host in combination with any data diode. To take this even further the installation media now supports Open Virtual Appliance.

          Major new functions in short:

          • Certificate Signing Requests can be generated from Control Center
          • Transfer flows can be configured to not remove folders down to a certain level
          • The installation media now also supports OVA (Open Virtual Appliance)
          • Increased speed and stability. The proxy now transfers in 900 Mbit/s by default
          • Overall stability and reliability improvements   

          Read more about The Diode Proxy 3.3 and how to apply it here.

          Request a demo for the Diode Proxy here.

          Open post
          link22 guard content disarm and reconstruction

          link22 Guard – Content Disarm and Reconstruction

          LINK22 GUARD – CONTENT DISARM AND RECONSTRUCTION

          link22 guard content disarm and reconstruction

          The partnership between link22 and our partner Glasswall enabled us to the Glasswall CDR Platform embedded as a content filter in our product link22 Cross Domain Solutions. Glasswall CDR Platform inspects the files at a binary level, remediating all deviations from the manufacturers specification and sanitising out risky Active Content by policy. This ensures only a clean, safe file passes through the Transport Domain.

          – Glasswall CDR engine adds an extra layer of protection against the most advanced and sophisticated threats. Expanding our already secure solution with Content Disarm and Reconstruction feels very good and safe for our customers, says Niklas Amnebratt at link22.

          For more information on the Glasswall CDR Platform:
          Contact nbloom@glasswallsolutions.com

          Scroll to top