Solid IT architecture
link22 Citadel is a composition of our four main areas of expertise, that includes secure transfer, secure access, administration, and monitoring. The basic version comes with everything an organisation needs to work efficiently in a secure environment.
Customization
Every organisation is unique, and adaptation is essential for maintaining both security and efficiency. Therefore, we supplement the link22 Citadel with additional features by implementing industry-standard components. One of the fundamental advantages of the link22 Citadel is its modular architecture. The ability to replace and update parts of the system facilitates maintenance and ongoing improvements. It also increases the possibility of complementing the system with IT products from other suppliers. When the landscape changes and a new function is needed, it can be implemented, whether it is link22 or someone else who best delivers it.
User-friendly for all
The link22 Citadel is made for large public organisations, small niche businesses, and everything in between. Built for high security, efficiency, and user-friendliness, we have developed the link22 Citadel for regular users working in an environment with high-security requirements. The user will feel at home in a familiar Windows environment, with all essential basic functions such as document management, storage, web access, email, and more. The link22 Standard can be used equally well in a large pharmaceutical company, a government agency, or a law firm.
Plug n’ play
link22 Citadel is a carefully selected composition of standard components complemented by user-friendly software. The core is built and configured in our production facility and then placed in your office or other location of your choice. At delivery, we plug in the power and press start. Simple and secure.
Approval by regulatory authorities
Talk to me about
secure it-solutions
- Helena Gällerdal Högfeldt
- info@link22.se
- +46 (0)13-13 24 00
Architecture
Secure Access
Supervision
All logs are collected and sent to a central Security Operations Center for log analysis.