Outpost – The standalone workstation
Realize your work securely through Outpost, a standalone workstation designed to meet the strictest legal requirements. Use our offline laptops and computers for strict security. Outpost is an off-the-grid computer that takes cybersecurity and IT security to the next level, making it an efficient solution for information security.
ENHANCE YOUR SECURITY WITH A SINGLE USER SYSTEM
Security is more than just passwords and firewalls. In today's digital landscape, you need robust solutions capable of handling both predictable and unforeseen challenges. This isolated workstation meets tough legal requirements. Outpost provides this by combining a single user system with state-of-the-art technology. Whether you're at the office or in the field, you can trust that your information is protected.
SIMPLE, EFFECTIVE, AND SECURE
Outpost is more than just a standalone single user computer; it's a secure workstation devoid of communication abilities. Outpost is a simple and effective solution to complex cybersecurity issues, offering solid protection against data breaches and ensuring information security.
THE STANDALONE SECURE WORKSTATION
Outpost offers the ultimate security solution - being completely disconnected. As a secure standalone workstation, Outpost gives you control over your data transfer. You choose whether your Outpost is to work with some USBs or no USBs. You choose to allow certain USBs to send information and certain USBs to receive information. It's an isolated system developed to create a safe environment for information management.
THE PROS OF BEING DISCONNECTED
The single user computer Outpost is perfect for temporary investigations and managing highly sensitive databases in, for example, public institutions. It's the perfect solution for storing designs for a sensitive infrastructure project or evidence for an ongoing criminal investigation. It's popular within the defense industry, municipalities, critical societal infrastructure, and more.
-
Outpost is solid.
Anonymous customer
-
The security requirements for Outpost have inspired our internal security requirements, it is a source of education for us.
Anonymous customer
-
We are satisfied with Outpost, it is easy to use and gets the job done. We recommend it to our customers.
Anonymous customer
-
We are generally happy with Outpost and the support received from link22.
Anonymous customer
-
The Outpost does the job.
Anonymous customer
-
Outpost does the job and well.
Anonymous customer
Specifics about The Outpost
- Meets legal requirements from multiple governing agencies
- Delivered with documentation to ensure fast and easy approval processes
- Software update functionality
- Back up possibilities
- DVD-burning
- Media archive
Istorage Diskashur Pro2 256-bit 2TB external USB-disk for archive
HP Color Laserjet Pro MFP M480f A4
HP Z23n G2 23” IPS-monitor at 1920 x 1080 pixels
External DVD-RW
1TB external USB-disk for updates
Why Outpost?
The Outpost is a classic market pull. Customers were screaming for this product and link22 simply obeyed. They specifically asked for an off the grid workstation to handle sensitive information independently. They sought something that could not be hacked through wireless communication. A product that directly meets the Security Protection Ordinance and follows both FMV’s and MSB’s guidelines.
Who is the customer?
It can be a military unit handling top secret information during a mission or an internal project group at a municipality conducting a sensitive or classified investigation. Another plausible customer is a research group at a big pharmaceutical company that handles top secret information. We see opportunities for use by the defense industry, governments, municipalities, county administrative boards, rescue services, the pharmaceutical industry and more.
Who is the user?
We rarely ask exactly who will be using our products and what for; this is a matter of integrity and security. We do know that the Outpost is used, hassle-free, by both IT-professionals and IT-novices. Our experience tells us that cyber security is needed everywhere, and we try to always deliver easy-to-use plug-n-play-solutions.
What can the Outpost be used for?
All kinds of sensitive or classified information. For example handling a sensitive data register for a health care client, CAD-blueprints for a protected object or crucial information regarding an ongoing legal case.
Do we not need a full scale IT-system?
The Outpost is built for the independent investigation, the individual case, the small group etc. We see that this product would benefit every single municipality and region in Sweden.
Can we build this on our own?
You, it is fairly straightforward but time consuming and expensive. You need to find the right computer, take it apart, configure some hardware, assemble, hire consultants for installation and configuration, get approval from reviewing authorities and then continuously get through necessary software updates. It takes several months and you need to repeat it for every new computer. We have done this and have the Outpost ready off the shelf. Cheaper, faster and better.
What is in the box?
The standard version includes a turnkey laptop and pre configured USB sticks (other sticks are blocked from the computer). Some customers choose to add a preconfigured printer and scanner. Outpost can also be delivered with protection against revealing radiation (RÖS, Tempest).
What do we need to do?
You need to choose how the user shall access the computer. Some buy access cards, others choose passwords, we have helped with smart cards and Yubikey. It depends on the case. You also need to establish internal management of the equipment. link22 can assist with a basis for a handling instruction that you adapt to your business. In addition, we offer administrator training to quickly get started with the computer.
Can this be hacked?
The computer has been modified so that it is completely disconnected from the Internet and wireless technology has been removed. The only way we know you can hack this solution is by influencing the person who has access to it.