Diese Website verwendet Cookies, um das Angebot nutzerfreundlicher und effektiver zu machen. Mit der Nutzung dieser Website stimmen Sie der Verwendung von Cookies zu.Weitere Informationen über die Verwendung von Cookies und die Möglichkeit der Verwendung von Cookies zu widersprechen, finden Sie hier.
Introducing a Magic Network Box. The Embedded Network Protector.
The i4-Guard is a non-invasive solution for your infrastructure. This box is based on proven military technology, and it is smaller, simpler and more secure than everything else to protect your network. Using it is as easy as child's play: Plug it in your network and it works like a charm.
The best thing is, i4-Guard can be installed wherever you want without modifying the underlying network layout!
Using your existing Infrastructure. Creating a Personal Overlay Network.
i4-Guard uses the existing physical network infrastructure to build a fully meshed virtual overlay network. This network is based on identity defined network architecture and every IP-enabled device in it has it's own cryptographic identity. As every node has it's own identity and can reach every other node in the network, no further routing rules are necessary and complexity is reduced.
A second benefit of the fully meshed solution: it is decentralized! This makes it more resilient to failure than existing solutions which use a centralized server. (eg. VPN)
Leider gibt es für diesen Aussteller kein deutsches Firmenprofil.
New thinking based on proven technology. A joint venture of industry veterans.
mils electronic has a proven record of more than 70 years history in designing, developing and supplying soft- and hardware crypto solutions for the governmental sector.
sigma star is a highly honored software company in the automotive and industrial segments. It jointly developed the Embedded Network Protector, an overlay network solution for the commercial sectors.
The Embedded Network Protector is based on the solid proofed MilsIP Bulk Encryptor, a world-wide deployed network encryption system, adapted and feature enriched to protect M2M (machine to machine communication) critical infrastructure.
The base technology can also be used for IOT environments to protect a multitude of devices.