Application

SECURE DIODE

is applicable in the following fields:

  • Secure connection to an ATM network
  • Anti-virus protection of information systems of banks
  • Stable use of the Internet in a secure network
  • Isolation of an administration network from affiliates' networks
  • Isolation of an confidential network from public networks
  • Isolation of confidential documents
FINANCE (BANKS)

  • Concurrent connection and isolation of an operating network (GSM)
  • Isolation of confidential documents
  • Isolation of a developer segment
  • Automated updating of operating systems and anti-virus software in a secure network
  • Secure connection to the Internet in a secure network
  • Isolation of an administration network from affiliates' networks, partners' networks, public networks
CORPORATIONS (TELECOM)

  • Isolation of confidential documents
  • Secure connection to the Internet in a secure network
  • Automated updating of operating systems and anti-virus software in a secure network
  • Isolation of a secure network from public networks
  • Isolation of an administration network from affiliates' networks
  • Secure connection to networks of controlled organizations
AUTHORITIES AND DEFENES

  • Real-time access to process data
  • Access to data from mobile devices for authorized persons
  • Total perimeter protection
  • Secure remote access for vendors
  • Transmission of process data to business applications (SAP, OSISOFT, etc.)
  • Arrangement for automated updating of operating systems and anti-virus software in secure network segments
CRITICAL INFRASTRUCTURE. GENERATION AND GRIDS

  • Remote monitoring
  • Protection from hackers' attacks
  • Automated updating of operating systems and anti-virus software in secure network segments
  • Secure remote access for vendors
  • Transmission of process data to business applications
CRITICAL INFRASTRUCTURE. OIL, GAS, REFINING.

  • In many countries of the world, devices like SECURE DIODE are required by laws to be installed for perimeter protection
  • Remote monitoring
  • Protection from hackers' attacks
  • Secure remote access for vendors
  • Transmission of process data to business applications
  • Provision of data to supervision bodies
CRITICAL INFRASTRUCTURE. NUCLEAR POWER PLANTS.

  • Operating savings
  • Remote monitoring
  • Protection from hackers' attacks
  • Automated updating of operating systems and anti-virus software in secure network segments
  • Secure remote access for vendors
  • Transmission of process data to business applications
CRITICAL INFRASTRUCTURE. TRANSPORT