DiskCrypt M10 Solution - Secure Portable Storage Device
CES 2019 award winning product for its outstanding product design and engineering.
The world’s first ultra-slim encrypted data storage with two-factor authentication and hardware-based full disk encryption.
Enhanced Storage Security
Hardware encryption (AES-XTS 256bits)
Higher security with 2FA smartcard (FIPS and CC certified)
Hardware-defined data-at-rest protection
M.2 (SATA III) SSD
High speed USB 3.1 and SATA III interfaces
Ultra slim credit card size
Wide range of colour selection
Dynamic M.2 SSD capacities
Ease of Use
Three simple steps for access
Platform and operating system independent
No software installation, upgrades or patches required
Download DiskCrypt M10 Brochure
Black Computer Solution - Secure Laptop and Desktop
Performs Network Isolation
Through its hardware-defined segregation technology, the system is able to safely perform network isolation in guarding against any exploitation such as ransomware.
Clean Operating System after every reboot for internet facing OS
It is able to neutralise threats repeatedly without any need for operating system and security updates.
Security Layered Approach
The laptop version is the first in the world to possess a Secure-BIOS level separation. Each security layer strengthens its defence mechanism in countering different threats.
Remote Management and Forensics
Serve as a sensor to protect organisations against insider threats and remote users as it is able to
manage and push down policies from backend, such as the dynamic white-listing of USBs, and the ability to perform remote forensics from the command centre immediately upon any detection of threats.
Download Black Computer Brochure
CyGlass - AI Advanced Threat Detection
Proven Military Grade Technology
Incubated in the most rigorous environments, CyGlass has unparalleled experience in delivering AI, Machine learning and machine reasoning based anomaly detection solutions for strategic cyber defence operations.
CyGlass requires no rules or configuration, completely self-learning, CyGlass applies an ensemble of algorithms, based on the context of the emerging network behavior, to accurately uncover non-signature based dark threats.
Critical Asset Classification
CyGlass intuitively identifies, understands and classifies which assets are most important to your business. By understanding the value of your assets, our deep machine learning techniques are even more precise when it comes to pinpointing the most critical threats to your network.
Continuously Monitors and Learns
With its continuous self-learning capabilities, the more data CyGlass ingests, the more powerful its dark threat detection precision becomes. CyGlass uses real-time network traffic, log data, and federated intelligence sources in tandem with user and asset data, to identify, visualize, and prioritize how a threat is evolving in real-time within your network.
Surfaces and Pinpoints Threats
By understanding where your most valuable assets reside and the traffic and users that interact with them, CyGlass is able to direct your analysts’ attention to the threats that are most critical. Our machine reasoning prioritizes and pinpoint the areas of concern as a threat is evolving, letting you take pre-emptive mitigative action.
ObserveIT - Insider Threat Management Platform
ObserveIT helps enterprises identify and eliminate insider threats.
Detect Insider Threats
ObserveIT provides organizations with “eyes on the endpoint” to continuously monitor data for signs of misuse. ObserveIT reviews all actions taken by users on an organization’s systems to protect data and reduce risk. Organizations can also anonymize captured data to protect privacy.
Investigate With Full Context
When an incident occurs, security teams need visibility and context to understand what happened. ObserveIT simplifies and streamlines investigations by offering granular details of user activity. By capturing and indexing user behavior, ObserveIT gives IT and security teams irrefutable evidence to streamline investigations.
Prevent insider threats by getting proactive, letting your users know when their behavior veers out of policy, blocking suspicious activities, and educating users on security and compliance best practices so that they do not accidentally expose you to risk.
Download ObserveIT Brochure
Download Portcullis Case Study
Cyber Exposure Monitoring (by CIH)
Cyber Exposure Monitoring is subscription-based,
real-time monitoring for identifying risks outside your organisation which covers information from the Dark Web, Deep Web and published data breaches.
Cyber Exposure Monitoring can help detect:
Black Market Activity
Personally Identifiable Information
Attacks and Previous Compromises
Download Cyber Exposure Monitoring Brochure
For any sales enquiries, please contact firstname.lastname@example.org