Secure Workstation
Fibernet provides a safe and secure workstation environment for multi-networks in different classifications. Our devices and products prevent information leakage between networks and provide the added value of reducing significantly the number of devices used or cutting down any peripherals equipment needed to one set.
VIDEO
Connecting a screen / smart screen / monitor / projector to your network can enable a deliberate or accidental attack. Prevent an infected screen from contaminating your system.
- Scenario: Screens can have malignant devices embedded in them at some point in the supply chain, prior to installation in the office.
Damage can be unknowingly inflicted in a scenario where a screen is infected (via malware, internet bug, infected USB etc.), the screen is relocated within the organization and infects the organizational network. - Solution: Prevent an infected screen from contaminating your system using our Blocker Secure Diode which serves as a unidirectional gatekeeping device that enables you to stream video while protecting your network.
NETWORK CONTROL
Securely switch between multiple PCs on different networks of different clearance levels, preventing information leakage, reducing the amount of equipment and space needed.
Scenario: There are many companies who manage multiple networks with different security classifications, for example:
- Hi-Tech company that has a development network for R&D on which information remains internal and secure as well as a standard internet connected network.
- Utility company that has a secure network to manage the utility as well as a standard internet connected network.
- Security / government agencies with a classified internal network as well as a standard internet connected network.
Solution: Fibernet offers a variety of secure KVM configurations to facilitate secure, smooth, no-delay, switching between devices. Configurations are designed according to your convenience: amount of sources, screens and whether or not the sources need to be distanced (computer in the data center connected to keyboard, mouse and monitor at the workstation).
AUDIO
Prevent the audio speaker / microphone / “Madonna” organizational or individual system from being hijacked and used as a listening device for ambient eavesdropping.
- Scenario: The audio system at the workstation (microphone, “Madonna” headset etc.) is a potential portal of attack via which critical information can be stolen and used maliciously.
- Solution: Fibernet provides unidirectional gatekeeping physical cybersecurity with our Secure Audio 3.5mm solution and our Secure KMA Dongle that has the added feature of a timer that cuts of the microphone after the defined time period, preventing it being accidently left on and recording information it shouldn’t.
MOBILE PHONES
Leave phones outside your secure area yet be able to continue using their app functionality on the secure workstation (camera, microphone, BT, WiFi, 3G/4G stays outside).
- Scenario: Command and Control Centers are usually classified areas which means that employees must deposit their mobile before entering and are cut off from the app functionality while in the Control Room. This can cause issues, particularly for those who need to stay inside the secure area for extended durations.
- Solution: Fibernet’s HIVE solution enables continuous use of mobile app functionality at the secure workstation, while eliminating the threat of leaking classified information.
*HIVE is currently compatible with Android mobile phones.
USB
Keyboard / mouse /smart (bio) cards are points of potential weak defense. Prevent information leakage at these points when switching between systems / users.
- Scenario: Connecting a USB peripheral device to a computer in the Control Center can accidentally or deliberately damage the entire Control Center eco-system. It is critical to protect against unauthorized devices.
- Solution: Fibernet offers KM/KVM devices that recognize permitted peripherals and utilize unidirectional gatekeeping to enable the desired connectivity while preventing undesired information flow and/or leakage.