top of page
digi-logo.png

DiskCrypt M10 Solution - Secure Portable Storage Device

m10.png

CES 2019 award winning product for its outstanding product design and engineering.

​

The world’s first ultra-slim encrypted data storage with two-factor authentication and hardware-based full disk encryption.

Enhanced Storage Security

  • Hardware encryption (AES-XTS 256bits)

  • Higher security with 2FA smartcard (FIPS and CC certified)

  • Hardware-defined data-at-rest protection

 

High Performance

  • M.2 (SATA III) SSD

  • High speed USB 3.1 and SATA III interfaces

 

Design

  • Ultra slim credit card size

  • Wide range of colour selection

  • Ergonomic usage

  • Dynamic M.2 SSD capacities

 

Ease of Use

  • Three simple steps for access

  • Platform and operating system independent

  • No software installation, upgrades or patches required

Download DiskCrypt M10 Brochure

digi-logo.png

Black Computer Solution - Secure Laptop and Desktop

black-computer-new.png

Performs Network Isolation
Through its hardware-defined segregation technology, the system is able to safely perform network isolation in guarding against any exploitation such as ransomware.

 

Clean Operating System after every reboot for internet facing OS
It is able to neutralise threats repeatedly without any need for operating system and security updates.

 

Security Layered Approach
The laptop version is the first in the world to possess a Secure-BIOS level separation. Each security layer strengthens its defence mechanism in countering different threats.

 

Remote Management and Forensics
Serve as a sensor to protect organisations against insider threats and remote users as it is able to
manage and push down policies from backend, such as the dynamic white-listing of USBs, and the ability to perform remote forensics from the command centre immediately upon any detection of threats.

Download Black Computer Brochure

CyGlass - AI Advanced Threat Detection

cyglass.png

Proven Military Grade Technology

Incubated in the most rigorous environments, CyGlass has unparalleled experience in delivering AI, Machine learning and machine reasoning based anomaly detection solutions for strategic cyber defence operations.

​

No Signatures

CyGlass requires no rules or configuration, completely self-learning, CyGlass applies an ensemble of algorithms, based on the context of the emerging network behavior, to accurately uncover non-signature based dark threats.

​

Critical Asset Classification

CyGlass intuitively identifies, understands and classifies which assets are most important to your business. By understanding the value of your assets, our deep machine learning techniques are even more precise when it comes to pinpointing the most critical threats to your network.

​

Continuously Monitors and Learns

With its continuous self-learning capabilities, the more data CyGlass ingests, the more powerful its dark threat detection precision becomes. CyGlass uses real-time network traffic, log data, and federated intelligence sources in tandem with user and asset data, to identify, visualize, and prioritize how a threat is evolving in real-time within your network.

​

Surfaces and Pinpoints Threats

By understanding where your most valuable assets reside and the traffic and users that interact with them, CyGlass is able to direct your analysts’ attention to the threats that are most critical. Our machine reasoning prioritizes and pinpoint the areas of concern as a threat is evolving, letting you take pre-emptive mitigative action.

ObserveIT - Insider Threat Management Platform

OIT.png

ObserveIT helps enterprises identify and eliminate insider threats.

Detect Insider Threats

ObserveIT provides organizations with “eyes on the endpoint” to continuously monitor data for signs of misuse. ObserveIT reviews all actions taken by users on an organization’s systems to protect data and reduce risk. Organizations can also anonymize captured data to protect privacy.

​

Investigate With Full Context

When an incident occurs, security teams need visibility and context to understand what happened. ObserveIT simplifies and streamlines investigations by offering granular details of user activity. By capturing and indexing user behavior, ObserveIT gives IT and security teams irrefutable evidence to streamline investigations.

​

Prevent Incidents

Prevent insider threats by getting proactive, letting your users know when their behavior veers out of policy, blocking suspicious activities, and educating users on security and compliance best practices so that they do not accidentally expose you to risk.

Download ObserveIT Brochure

Download Portcullis Case Study

Cyber Exposure Monitoring (by CIH)

iStock-808157554.jpg

Cyber Exposure Monitoring is subscription-based,

real-time monitoring for identifying risks outside your organisation which covers information from the Dark Web, Deep Web and published data breaches.

​

Cyber Exposure Monitoring can help detect: 

  • Sensitive Disclosures

  • Discussions

  • Black Market Activity

  • Financial Information

  • Exposed Credentials

  • Personally Identifiable Information

  • Hacker Groups

  • Attacks and Previous Compromises

Download Cyber Exposure Monitoring Brochure

For any sales enquiries, please contact sales@oystersecurity.co

bottom of page