The Outpost is a classic market pull. Customers were screaming for this product and we simply obeyed. They specifically asked for an off the grid workstation to handle sensitive information independently. They sought something that could not be hacked through wireless communication. A product that directly meets the Security Protection Ordinance and follows both FMV’s and MSB’s guidelines.
Who is the customer?
It can be a military unit handling top secret information during a mission or an internal project group at a municipality conducting an independent investigation. Another plausible customer is a research group at a big pharmaceutical company that handles top secret information. We see opportunities for use by the defense, authorities, municipalities, county administrative boards, rescue services, the pharmaceutical industry and more.
Who is the user?
We rarely ask exactly who will be using our products and what for; this is a matter of integrity and security. We do know that the Outpost is used, hassle-free, by both IT-professionals and IT-novices. Our experience tells us that cyber security is needed everywhere and we try to always deliver easy-to-use plug-n-play-solutions.
What can the Outpost be used for?
All kinds of sensitive data. For example handling a sensitive data register for a health care client, CAD-blueprints for a protected object or crucial information regarding an ongoing legal case.
Do we not need a full scale IT-system?
The Outpost is built for the independent investigation, the individual case, the small group etc. We see that this product would benefit every single municipality in Sweden.
Can we build this on our own?
Yes, it is straight forward but time consuming and expensive. You need to find the right laptop, take it apart, configure some hardware, assemble, hire consultants for installation and configuration, get approval from reviewing authorities and then continuously get through necessary software updates. It takes several months and you need to repeat it for every new computer. We have done this and have the Outpost ready off the shelf. Cheaper, faster and better.
What is in the box?
The standard version includes a turnkey laptop and pre configured USB sticks (other sticks are blocked from the computer). Some customers choose to add a preconfigured printer and scanner.
What do we need to do?
You need to choose how the user shall access the computer. Some buy access cards, others choose passwords, we have helped with smart cards and yubikey. It depends on the case.
Can this be hacked?
The computer has been modified so that it is completely disconnected from the Internet and wireless technology has been removed. The only way we know you can hack this solution is by influencing the person who has access to it.