infodas
connect.
The software suite for secure, reliable and efficient data supply to protected systems.
Easy, reliable and secure data transfer.
In today’s interconnected world, but especially in the IT sector, security and reliability are crucial. Regular updates and patches are fundamental measures. In non-critical environments, this is usually done via a direct connection to the internet. This is done directly by the products used or with the help of patch management systems. System maintenance becomes more extensive in environments with increased security or decentralized administration. Here, systems are physically or logically separated from each other and have to be maintained manually, often in relation to the transfer of large amounts of data. This requires an increased amount of time and harbors potential sources of error. For these scenarios, infodas connect. has been developed.
Key features.
Secure packaging
Large amounts of data are packed for transfer. Encryption techniques and protocols guarantee access only for authorized recipients.
Integrity check
The integrity check ensures that the transferred data is not changed or damaged during the transfer. The verification is carried out using a hash function and signatures.
Central source
Providing data in a central storage location. infodas connect. enables you to organize and synchronize data efficiently while maintaining a high level of data security.
Add-ons available
Available add-ons allow to tailor infodas connect. to most known use cases. For example, public sources can be addressed for automated distribution services.
Fully integrable
For a comprehensive and secure 360-degree data transfer solution, infodas connect. can be perfectly integrated with other products from our SDoT Cross Domain Solutions family.
Supported software products.
- Common platforms: Windows, Linux Debian, Red Hat (CentOS) and OpenSUSE
- Security software (e.g. exchange of virus signatures for virus scanners)
- Common application software (e.g. Mozilla Firefox and Google Chrome)
- Other Microsoft products
- Geo-information and weather data
- Our experts will be happy to support you with further solutions!
Key Benefits.
Modular architecture
As part of a secure system architecture, infodas connect. facilitates efficient update and patch processes and therefore contributes to compliance with security standards.
Reliable data transfer
infodas connect. effectively verifies and distributes data to secure systems through a first-class feature stack.
Secure and private
The evaluated security architecture ensures that data is only stored on selected devices. This means that no server gets compromised.
Many years of expertise
Best practices and a high level of experience provide the foundation for a range of add-ons required to establish secure and trustworthy applications.
Modular structure.
The following options are available with defined sources and targets:
How does infodas connect. work?
Two basic modules simplify the organization of complex update and patch processes. The sender service collects the data to be distributed. Once this task of collecting certain data has been completed, the sender service contacts the receiver service. Here, infodas connect. can address the receiver service via a firewall, a DMZ or via an implemented cross-domain solution. The administrator has an overview of the data to be distributed at all times and can release it at a central location. Both services are located in virtual Linux environments in the respective domains.
Use cases infodas connect.move
Mission-critical data from the bunker to the control center
Important combat data has to be transmitted from the battlefield to the control center. This data should be deleted immediately after successful transmission so that it cannot be viewed by the enemy. With the help of the combat data, the artillery can be correctly aligned in a high-performance and uncomplicated manner.
Turntable interface for an inaccessible area
There is only limited storage space on an interface. The data should only land here to be checked briefly and then dragged and dropped into a folder. The data is then automatically transferred to the connected target. After successful transfer, the memory is emptied and freed for further data.
Use cases infodas connect.copy
Collaborating on classified documents
In a protected area, there is no internet access and only a selected team has permission. But if collaboration is to take place from outside this area, how can the documents be made available without countless versions (some with the same name) being coordinated by e-mail? The solution is a central repository. The documents are transferred from the unprotected area to the secure area where they can be edited. It is ensured that exactly this document in its form and content is also made available to the protected area, where it can be edited then. The permitted team can thereby receive documents from outside.
Let’s get in touch!
Contact our cybersecurity experts. Together we will find a customized solution to protect your highly sensitive data.