A hardware based network encryptor that provides the means for extending an organizations’ protected IP networks securely over an untrusted network. For enterprise and governments.
Hardware encrypted voice via a Micro SD card. Intended for business, enterprise and governments. Features true random number generator, call and messaging history is encrypted, encrypted phonebook. Ap
A portable, one button, battery operated VPN router. Uses it’s own VPN service which includes PureVPN, ProXPN, and LeVPN. Requires annual subscription.
A line of USB and smartcards for use with network and PC authentication. Feature multi-factor authentication, public key infrastructure (PKI) or GOST encryption, biometric identification and one-time
Hardware encrypted hard drives. HDD and SSD. PIN pad and bio-metric. Portable and desktop. Feature brute force protection and FIPS 140-2 Level 2 Validation. 120 GB to 8 TB.
Secure mobile phone. Features include encrypted email and messaging. 10+ ways to secure wipe, secure bootloader, locates and protects phone from connecting to fake cell sites, ie: Stingray. Remote man