Press Releases Use Cases
Secure Data Transfer
Transferring data from system to system where the data is too big, or too sensitive to transfer online
Datalogging
Capturing data from embedded, off line equipment
Secure Bootable System
A bootable image (Win/Linux/Mac/etc) on device to create a secure, mobile computing environment
Air Gapped System Interface
Secure device to transfer data or system updates to air gapped systems
eDiscovery
Device to collect and distribute eDiscovery data to involved parties
Forensics
Secure device to capture system event data for analysis
Secure Backup
Secure device to backup sensitive data and disaster recovery solutions
Secure Firmware Updates to Off-Line Equipment / Systems
Distribute system FW and software updates for embedded equipment and remote off line systems
Digital Asset Protection
If it can stay offline, keep it offline to protect sensitive data from cyber-attack or insider misuse
General Use / Compliance with Regulations
Common sense approach to data security and compliance
Storage of Digital Credentials and Keys / Hardware Security Module (HSM)
Secure, mobile storage of system credentials