Open post

We Launch Data Guard Version 3.12 – An Update for Safer Transfers

We Launch Data Guard Version 3.12 - An Update for Safer Transfers

link22 now launches an updated version of our core product within Secure Transfer, Data Guard. With improved functionality and increased flexibility in version 3.12, we now offer even stronger protection for critical data.

Data Guard - Protection Against Cyber Threats

Data Guard is a central component in link22's offerings within Secure Transfer. The product inspects files and approves or denies them before they enter or leave a system. Data Guard enables secure, controlled, and traceable import of program updates to secure domains. Filters and antivirus programs check files for potentially harmful content.

Enhanced Functionality and Increased Flexibility

Data Guard can also be used to verify and approve which documents are allowed to be exported from sensitive networks. The product is highly flexible and configurable - it comes with a range of filters designed to detect unwanted files, and also allows you to easily add your own filters.

Data Guard 3.12 - A New Era of Cybersecurity

link22 is now launching version 3.12 of the Data Guard product. "We currently have quite a few customers using our Data Guard, both in the private and public sectors," says Marcus Ekbäck, Business Area Manager for Cross Domain Solutions at link22. "The content of our new version is based on requests from our customers, but also improvements that we see make a good product even better."

Protect Your Organisation with Data Guard 3.12

With Data Guard 3.12, you can feel more secure in the knowledge that your company's critical data is protected against cyber threats. Whether you need to ensure the import of program updates or control which documents are allowed to be exported from your network, Data Guard 3.12 is a reliable solution.

To learn more about how Data Guard 3.12 can enhance your organization's cybersecurity, visit our product page for Data Guard.

Read more

Related

Marcus Ekbäck

Contact us!

Marcus Ekbäck
sales@link22.se
+46 13-13 24 00

Sign up for our newsletter!


    Open post

    link22 Launches Diode TCP Connector: Secure Streaming of TCP Data Over Data Diodes

    link22 Launches Diode TCP Connector: Secure Streaming of TCP Data Over Data Diodes

    link22 introduces a new product, the Diode TCP Connector, enabling secure streaming of TCP data over a physical data diode. This innovation provides a secure solution for channeling external data streams into an offline IT environment or exporting sensor data and logs from a power facility.

    Secure Streaming of TCP Data Over Data Diode

    link22 is proud to present our latest product, the Diode TCP Connector. This software allows for the secure transmission of TCP data over a physical data diode without compromising security. The product consists of two applications, one running upstream of the diode and one on the downstream side.

    Use Cases for Diode TCP Connector

    The Diode TCP Connector can be used to securely capture an external data stream and channel it into an offline domain. It can also be used to export sensor data and logs from a power facility through a diode, ensuring that no malicious software can travel in the opposite direction.

    Support for Both UDP and TCP Streaming

    The Diode TCP Connector supports both UDP and TCP data streaming over a diode. The application supports multiple concurrent streams, making it a flexible solution for various use cases.

    link22 – A Pioneer in Data Diode Software

    link22 has long been a pioneer in data diode software. Our software works with all data diodes, regardless of the manufacturer. We have long supported file transfer over a diode, and it is gratifying that we can now also handle streaming TCP data securely and efficiently, says Marcus Ekbäck, Business Area Manager for Cross Domain Solutions at link22.

    To learn more about how the Diode TCP Connector can improve your organization's cybersecurity, visit our product page for Data Diode Zero.

    Read more

    Related

    Marcus Ekbäck

    Contact us!

    Marcus Ekbäck
    info@link22.se
    +46 13-13 24 00

    Sign up for our newsletter!


      Open post

      link22 Delivers Eavesdropping Protection to Law Firm Glimstedt

      link22 Delivers Eavesdropping Protection to Law Firm Glimstedt

      In an era where digital security is paramount, the law firm Glimstedt takes the lead by implementing link22's eavesdropping protection, Shield. With a background of successful deliveries to authorities and the defense industry, this marks an important step for link22 into the legal sector.

      From Defense to Law

      For many years, link22 has delivered eavesdropping protection in the form of Shield to authorities and the defense industry. This week, the product was introduced to the legal sector, another area where confidential information is frequently discussed in meeting rooms. The law firm Glimstedt is now positioning itself as one of the industry's most eavesdropping-protected player.

      In the digital age we live in, the protection of confidential information is more important than ever. Law firms, like Glimstedt, constantly face the challenge of ensuring that their client meetings remain private.

      Eavesdropping Protection & Law

      During the delivery, the reasons why the legal sector wants to prevent recording of meetings, whether intentionally or unintentionally, via mobile phones were discussed. This is partly about meetings with clients, where one wants to prevent an external party, who may have accessed the client's mobile through malicious software, from eavesdropping to gain an information advantage. But it's also about meetings with opposing parties. Gustav Sandberg, Managing Partner at Glimstedt Östergötland, puts it this way:

      "When meeting with clients we sometimes want to avoid tapping if for example we’re discussing business secrets. When meeting with counterparts we sometimes want to avoid the risk of being recorded. It’s very easy to do today, a recording can be misused and we want to minimize such risks. Our clients expect and value our confidentiality."

      Beyond the direct functional reasons for having eavesdropping protection in meeting rooms, there's also a signaling value. The goal is for both clients and opposing parties to take our meetings more seriously, while feeling more relaxed.

      Simple & Advanced

      During the delivery meeting, Daniel Lester, Business Area Manager, described how Shield works with sharp noise, rubber packing, separation material, tamper protection, security levels, and more. He also demonstrated how easy it is to use the product: You open the lid, participants put in their phones, and then you close the lid. The phones are in the room, for all parties to oversee, but not recording or eavesdropping.

      In a world where information can easily spread and be misused, it's crucial for companies, especially law firms, to take measures to protect confidential information. link22's Shield offers an effective solution for this. The delivery to Glimstedt is a step towards ensuring integrity and security during meetings. With Shield, law firms can now feel safer, knowing that their confidential meetings remain just that - confidential.

      Read more about Shield here.

      Read more

      Related

      Daniel Lester link22

      Contact us!

      Daniel Lester
      sales@link22.se
      +46 13-13 24 00

      Sign up for our newsletter!


        Open post

        link22 launches eavesdropping protection for the Swedish market

        link22 launches eavesdropping protection for the Swedish market

        In a world where digital security is constantly challenged, link22 takes a step forward by launching with the Audio Diode in Sweden. The product is designed to protect from eavesdropping through speakers by ensuring unidirectional sound flows.

        Speakers can be used for eavesdropping

        At a time when the possibilities for attacks are increasing, link22 continues to launch solutions for enhanced security. We are proud to introduce Audio Diode to the Swedish market, a product designed to prevent eavesdropping through speakers.

        Hackers have become increasingly sophisticated, with techniques that can convert speakers into microphones, allowing them to eavesdrop on conversations. The attacker achieves this by recording the signals that appear when a speaker membrane vibrates due to speech in the room (this evokes a signal traveling “backwards” in the sound cable). The recorded signals are then converted back to speech in the attacker's computer and the eavesdropping operation is successful. With Audio Diode, the user can ensure that speakers only operate in one direction, preventing sound signals from traveling backward. This prevents eavesdropping.

        "We are proud to offer a solution like Audio Diode. It is a product that not only offers high security but also gives our customers peace of mind knowing that their talks are protected," says Daniel Lester, Business Area Manager at link22.

        Audio Diode to protect sensitive information

        Anyone who regularly works with sensitive information and participates in digital meetings can benefit from Audio Diode. Authorities, who often handle confidential information, can ensure that their digital calls remain private and protected from eavesdropping. Similarly, law firms, constantly handling client information and legal discussions, can integrate Audio Diode to enhance their information security.

        Audio Diode against a real security risk

        Eavesdropping through speakers is a real security risk for many businesses. Unprotected devices like headphones and speakers can be manipulated by attackers. Audio Diode prevents sound signals from traveling "backward" through the sound system, reducing the risk of eavesdropping through surrounding speakers.

        Low-pass filter

        Sound passing through Audio Diode goes through a low-pass filter, limiting the sound frequencies to those perceivable by the human ear. This prevents hackers from eavesdropping by sending high-frequency signals to an external hacking device.

        Read more about Audio Diode here.

        Unidirectional sound flows

        The Audio Diode allows sound signals to travel in only one direction. This means that sound signals cannot travel “backward”. The product thereby prevents hackers from manipulating a speaker/headphone to function as a microphone, capturing surrounding conversations.

        Simple protection against advanced threats

        Audio Diode is a simple way to protect against advanced intrusion attempts. It is easily installed between the speaker and the computer in rooms where information is exchanged verbally.

        For more information about Audio Diode and how it can be integrated into your workplace, contact us at sales@link22.se or book a demo here.

        Read more

        Related

        Was the article valuable?

        Sign up for our newsletter!


          Do you want to know more?

          Daniel Lester
          sales@link22.se
          +46 13-13 24 00

          Daniel Lester link22
          Open post
          international-collaboration-between-link22-and-glasswall-to-protect-businesses-from-zero-day-threats-thumb

          link22 – Glasswall collaboration to protect against Zero Day Threats

          link22 - Glasswall collaboration to protect against Zero Day Threats

          link22 is strengthening its collaboration with British Glasswall in a joint mission to enhance protection against Zero Day threats, previously unknown cyber attacks. By integrating Glasswall's Content Disarm and Reconstruction (CDR) technology with link22's security solutions, they now offer reinforced defense against these threats.

          international-collaboration-between-link22-and-glasswall-to-protect-businesses-from-zero-day-threats-thumb

          Collaboration against Zero Day attacks

          The Swedish cybersecurity company link22 has strengthened its collaboration with British Glasswall to provide advanced protection against zero day threats (previously unknown threats). The partnership allows customers to combine link22's security solutions with Glasswall's Content Disarm and Reconstruction (CDR) function. link22 now delivers an enhanced defense against Zero Day attacks, a type of threat where traditional defensive mechanisms have been ineffective.

          The simplest way to understand CDR is to compare it with traditional defense methods. Firewalls and filters work by identifying and blocking known threats, that is, viruses or software that have previously been classified as harmful. Threats generally become known after the first incident. Therefore, firewalls and filters do not protect against undiscovered threats, such as zero day attacks. CDR addresses this vulnerability by converting each file into a harmless file, regardless of whether the original file was harmful or not.

          By dismantling, validating, cleaning, and then reconstructing files based on specifications for known and well-defined file types, CDR transforms passive security strategies into active ones. The implementation of this technology represents a significant improvement in the security of file transfers from, for example, open IT environments to isolated IT environments.

          Integrates seamlessly with the link22 Cross Domain Solutions

          The seamless integration of Glasswall's CDR technology into link22's Cross Domain Solution makes it easy for existing and new customers to implement a higher level of security. The technology can be used for both the import and export of information, within and between security domains. The partnership enhances the capabilities of link22's Cross Domain Solutions.

          link22 has customers with specific and complex requirements. To meet these, the company uses both internal expertise and partnerships with niche players such as Glasswall. They do what is necessary to deliver uncompromising security.

          CDR operates in four steps

          1. Inspect: Three layers of the file are inspected to validate that its digital DNA matches the manufacturer's specification of a harmless file. Measures are taken immediately where deviations are detected.
          2. Clean: Active content of a risky nature, such as macros and embedded links, is cleaned and removed based on the user's policy.
          3. Reconstruct: The file is reconstructed according to the manufacturer's standard for a harmless file type, ensuring that the file is clean and free from threats.
          4. Deliver: The user has imported a secure, identical file that is approved, standardized, and trusted.

          The collaboration with Glasswall illustrates link22's commitment to staying at the forefront of delivering secure IT solutions. Are you interested in heightening your defense against Zero Day Threats? Please book a demo with us!

          Read more

          Related

          Was the article valuable?

          Sign up for our newsletter!


            Do you want to know more?

            Marcus Ekbäck
            sales@link22.se
            +46 13-13 24 00

            Marcus Ekbäck
            Open post

            New Release Secure Access Client – version 1.7

            New Release Secure Access Client - version 1.7

            Secure Access Client is an application that replaces the standard desktop interface on Windows.

            The application is used in IT systems where the administrator wants to control which IT resources the user can access on their client. Two examples of IT resources are local applications on the user's computer and virtual desktops in a data center. Secure Access Client runs in kiosk mode, i.e. takes over the entire screen, and displays resources that the user has access to. Administrators can control at a detailed level which resources are to be displayed for each user.

            New features 1.7

            • A new system for hiding resources based on user location has been added. Each resource has a classification level, and the application will only display resources with a classification level no higher than the maximum allowed level in the location the user is connecting from. The users location is determined based on Active Directory sites and subnets.
            • New registry entries “Locations” and “Security Classification Levels” have been added to support the above feature.
            • Added colouring to Icons depending on their classification levels.
            • Added zoom controls for the resource view and keyboard shortcuts using Ctrl+ and Ctrl-.
            • The refresh button now refreshes resources, SCLs, locations and runs gpupdate to update group policies.
            • Made the notification bar more prominent when messages are displayed.
            • Added Shut Down button to the system menu in the bottom left.
            • Added username and location information to About menu.
            • Resource view buttons become greyed out when they cannot be used.
            • Added support for newline (\n) characters in resource names and descriptions.

            Read more

            Related

            Was the article valuable?

            Sign up for our newsletter!


              Do you want to know more?

              Helena Gällerdal Högfeldt
              sales@link22.se
              +46 13-13 24 00

              Helena Gällerdal Högfeldt
              Open post
              laptop and mug with link22 logo

              Productnews – link22 Offline Update

              Productnews – link22 Offline Update

              Ellen Brunnström and Martin Steen-Holmberg

              link22 can now offer a product solution to ensure and automate downloads to physically separated environments. The solution ensures that downloads are inspected and managed over unidirectional data flows.

              The process is fully automated, information is fetched, reviewed, and then distributed to different locations in the target system. Files are inspected by link22 Data Guard, where a thorough inspection of each file takes place. The file is broken down into its components to detect vulnerabilities. Inspection can be done with traditional antivirus software, but we also support "Content Disarm and Reconstruction" (CDR), where each file is checked in detail to detect and remove unwanted information. For example, with CDR, we can remove embedded code in Office files. (CDR requires a separate license.) link22 Data Guard has an open architecture that allows for the addition of further customer-specific filters. Extending with additional filters is easy with our development kit.

              Read more about link22 Offline Update.

              Så funkar link22 offline-update

              Our efficient architecture saves time and energy. Files are only inspected once before being distributed to multiple end domains/target environments.

              For example, we can handle the following files from the Internet today;

              • Linux updates (Ubuntu, Rocky, CentOS, Epel, Raspbian, and more)
              • Antivirus software updates (Defender ClamAV, and more)
              • Docker
              • Python repositories
              • Emacs Packages
              • CRL lists and CA

              Access to downloaded files is done either via HTTPS or file sharing. This means that, for example, Linux computers believe they are online and can easily be patched regularly.

              We are especially pleased to announce that we are extending our system license for link22 Secure Transfer with our new functionality. Existing customers can contact us to start using link22 Secure Offline Update. More information is available on our website.

              Contact sales@link22.se if you are interested in learning more about how this could be implemented in your context.

              Open post
              säkerhetsprodukt link22

              Three government security challenges solved with data diodes

              Three government security challenges solved with data diodes

              Appropriate data security

              As government authorities are becoming more vulnerable to various types of cyberattacks, it is crucial to prioritize cybersecurity and implement systematic measures to protect against these threats. An important aspect of cybersecurity is selecting the appropriate solutions, such as data diodes, which are designed to withstand attacks and provide a high level of security for sensitive information. By utilizing data diodes, government authorities can effectively address a range of IT security issues and ensure the protection of data security.

              The data Diode

              A data diode is a cybersecurity solution that utilizes one-way-communication to exchange information. This hardware product provides high assurance in maintaining the integrity of networks by preventing intrusions, while also protecting sensitive information through maintaining network confidentiality. Data diodes are an important part of any comprehensive cybersecurity strategy.

              säkerhetsprodukt link22

              Data diode or Firewall?

              When it comes to protecting sensitive or classified information from leakage or manipulation, one common solution is to completely disconnect it from other networks. However, there may be times when data needs to be transferred to or from the protected network. In these cases, a firewall may not be sufficient for improving cybersecurity. While a firewall can help protect the network by only allowing certain traffic through, a high assurance supplement in the form of a Cross Domain Solution (CDS) may also be necessary. A CDS, like a data diode, helps to maintain secure information exchange between domains with different security or protection needs. Data diodes, specifically, are a type of CDS that facilitate communication, sharing, or movement of information between domains while also applying validation, transformation, or filtering to the exchange.

              Secure File Transfer

              One use of data diodes for government authorities is secure file transfer. When transferring important information from a high-security system to a lower-security administrative office network, there is a risk of security breaches. However, by using a data diode to send the data from the high-security network to the lower-security network, the information can be transmitted safely while maintaining the integrity of the high-security network. The data diode ensures that no one can use the same connection to access the sensitive network and potentially manipulate it while also protecting the sending domain.

              Learn more about the functions of data diodes here.

              Using data diodes for traceability and logging in security-sensitive operations

              Centralized log collection in security-sensitive systems can increase the risk of attacks. To mitigate these risks, a solution is needed that protects both log information and all connected systems.

              Many IT systems generate logs that allow for troubleshooting and traceability. To maximize the usefulness of these logs, it is important to collect logs from as many systems as possible into a central system for storage and analysis.

              If you have security-sensitive or zoned systems and want to implement centralized log collection, you must consider the inherent goal conflict. Logging benefits from having a common system for all zones/subsystems, but a common system increases the risk of various types of attack and the risk of information leakage between the supervised systems.

              Data diodes can provide powerful protection for centralized log collection. Each zone that delivers log information is protected with a data diode. The data flow is unidirectional towards the log system. This allows for the use of a common log system, regardless of the number of zones that deliver data to it. 

              Read more about logging and CDS here.

              Welcome Henrik Nilsson!

              Secure Updates

              As the use of Windows and/or Linux based systems within ICS/SCADA has grown, the need to update these systems has become more pressing. This is because complex software often contains bugs that need to be fixed in order to maintain system stability and security.

              However, if not done properly, the process of updating can itself pose a security risk. The integrity and availability of the systems must be maintained, and most system updates are not adequately evaluated in the environment in which they are used or in combination with the applications that are running.

              One way to securely perform updates is by using a data diode to ensure one-way communication. The data diode is connected in such a way that information can be imported into the system, but since no traffic can be transmitted in the opposite direction, information leakage is prevented.

              We know the in and outs of data diodes from a cybersecurity point of view. Please do not hesitate to ask us anything.

              Book a demo or a meeting here.

              Welcome Henrik Nilsson!
              Open post

              A national safety discussion secured by Shield

              A national safety discussion secured by Shield

              A meeting between military Officers and the ministry of defense is held with security support from Shield

              Mobile phones are relatively easy to use for eavesdropping on meetings. Phones are therefore an attractive target for foregin powers who want to conduct espionage. They can be hacked through downloaded apps that have access to the microphone and by physically getting a hold of the phone to install malicious software. This means that a phone should never be left out of sight and that a phone never should be laying around during a meeting where sensitive information is discussed. An obvious cyber security conundrum.

              Safety meeting

              Shield is our solution to this problem, a noise-box especially developed to make phones less of a security risk. Here is an example of how Shield can be useful in a meeting between politicians and national defense.

              Two high ranked officers have a meeting with the defense ministry and two politicians from the ruling party. None of the participants want to leave their phone out of sight as it is a security risk for them. They enter the meeting room and put their phones in Shield. One of the politicians has a smartwatch that she puts in the Shield. The meeting is held at full discretion.

              Read more about Shield here.

              Welcome Henrik Nilsson!
              Open post

              Cyber security for the toughest security requirements.

              Cyber security for the toughest security requirements

              More of everything

              We feed more people with fewer resources, we educate more humans faster and more people live in luxury. All thanks to the printing press, the agricultural revolution and the industrial revolution. It's now clear that digitalization is taking over in order to optimize and improve society further. Products are being connected, information is being created and shared in real-time, people are meeting, value is being saved on blockchain networks, and the list goes on. Society is changing fundamentally and everyone is affected.

              Cybersecurity

              What was once protected by guards, locks, and long distances need new types of defense in our digital world. Cybersecurity is essential to maintain function and security in society. Our product portfolio is the result of 16 years of helping organizations and businesses meet the highest security requirements. We offer the market-leading off-the-grid laptop Outpost, which is used by hundreds of customers. Outpost is the best in the industry and ensures compliance with the highest security requirements in Sweden.

              Full control

              Government agencies, businesses, municipalities, defense forces, infrastructure, and individuals are all interconnected. The economies of scale are obvious and the challenges are many.

              How do we protect critical infrastructure? How can we digitize government agencies without jeopardizing the integrity of the citizen? How can we link domains with different security classifications? How do we give people access to data without making them targets for extortion? How do we make it easy for citizens to administer their personal data without enabling manipulation from anyone else?

              Welcome Henrik Nilsson!

              Take back control

              To have full control, meet data security requirements and privacy guidelines, the solution in many cases is a so-called on-premises solution. We are specialists in this area. A number of cases have taught us how a government agency or company can maintain its effectiveness without having servers, data storage or processor power outsourced to a third party. Full control without compromise.

              Adaptability

              The digital landscape is constantly changing, so adaptability is key. We deliver ongoing modular solutions to help our customers who constantly face new needs, requirements, and threats. We are a long-term and reliable partner in an ever-changing world of cybersecurity.

              Contact us for a free initial consultation on how we can work together to address your cybersecurity needs.

              Welcome Henrik Nilsson!

              Posts navigation

              1 2 3
              Scroll to top