Cross Domain Solutions

Some files should be transferable, some should not. Some files can be transferred if they do not contain sensitive information. Some files are only transferred if they are signed. Some files can be exported but not imported, or vice versa. We are experts in cross domain solutions.

Transfer without open doors

Set up one-way-only-transfers with our data diodes. Extract useful temperature data from a power plant without enabling trojans to enter. Upload evidence for a criminal case without making it possible to remove, extract or manipulate the data.

CROSS DOMAIN SECURITY

Our product Guard lets you inspect every file. A bank may want to stop all file transfers containing something that looks like a credit card number. A government may want to stop all files containing a social security number.

Humans for special cases

Computers are good for general cases. People are made for special occasions. Use our Countersign feature and require a third person signature to transfer sensitive files from designated locations. Humans and computers working together with cross domain security. Tailored for export control.

Smooth and secure

The link22 Secure Transfer suite comes with user friendly clients, smooth system updates and system development flexibility. All to keep usage, management and development efficient and secure.

Talk to me about cross domain solutions

Marcus Ekbäck
sales@link22.se
+46 (0)13-13 24 00
Linkedin

Specifics about Cross Domain Solutions

A strictly controlled development environment

Developing systems with classified source code require a development environment with strict control. But sometimes you need to add unclassified software developed somewhere else. You can automate the merge.

link22 development explained
Crossdomain solutions for secure data transfer

Secure Transfer will help with:

  • Source code import to a closed system from popular, version control systems.
  • Import of third-party libraries and components.

The example above shows a development environment for a system containing a combination of unclassified source code with third party libraries as well as classified source code developed in a closed development environment. Final build is done in the closed environment.

Scroll to top