Our product line

Because we started our manufacturing activity being already security centric, our entire product line is designed through secured processes that includes quality assurance and the latest body of knowledge in IT security. As a result we are constantly focusing our efforts to provide the best of security to our customers.

Our new product, currently under its final implementation and verification stage, has been designed and developed using the latest risk management and analysis methods based on the newest standards: ISO 27005 and ISO 31000.

This technique allowed us to implement security principles not only in our product (cryptographic scheme and code) but also to include these rules in its development environment (making it safer) and also to anticipate our future customers' inquiries regarding the quality of security they could expect.
During the coming months, we are going to provide you with more information and more details about our future leading product, code name: DFABS.


DFABS (launch Q2 2011)

Designed to fill possible gaps in some ISMS and manufactured to provide a major security control with more granularity, this appliance is under its last development stage.

First release Q2 2011.
12/20/2010 - First public announcement
DFABS appliance is going to be released Q2 2011.


Bootable USB device

Definitely a must in any IT support team toolbox, this well known tool which belongs to the « oldies but goodies » pantheon has been upgraded and can now also be used for IT forensic operations.

Our product now includes a wide range of capability:

Multiple partition format recognition:
     - vfat,
     - ntfs,
     - ext3,
     and more.

Surface encryption:
     - AES-CBC 256 bits,
     - prior randomization for small size device.

Network enabled device:
     - TCP/IP,
     - DHCP,
     - FTP,
     and more.

And finally a strong anti-copy mechanism which allows the use of our device without raising risks of sensitive data leakage.

The only requirement is a USB bootable computer or laptop. The USB bootable capability depends on the computer you like to boot with our device. This capacity is usually verifiable in the BIOS setup of that computer or with its manufacturer.

Embedded software is upgradable provided the computer you boot using our device is connected to the internet or a private network that includes the proper facility.

Our device is available in several size and storage technology:
     - Most common use: USB key (8 GB, 16 GB),
     - More specific usage: USB hard disk (250 GB, 320 GB and up),
     - More specific usage: USB solid state disk (SDD).

Contact us to get availability of our product depending on technology and size and quantity.

01/03/2010 - Product line extension
Bootable USB device line extended to USB hard drive and USB SSD.

11/01/2009 - First release
First bootable USB device to be released: 8 GB USB Key.

09/15/2009 - First public announcement
Bootable USB devices are going to be released Q4 2009.


Remote surveillance system

A well known and somewhat mandatory tool used in many security architectures to enhance access control and to set up sensitive area monitoring.

Our computer based solution has been design to enhance this tool with more scalability in its implementation, thus providing a new capability that allows remote surveillance and remote storage of video recording.

Our solution physically separates video digitizing function from monitoring and recording functions using a network. This enhancement allows a more precise implementation of each part of our surveillance system.

Depending on the system's implementation, remote surveillance and remote storage can be operated either through the Internet or through a private network.

Due to its modular nature our system has been designed to be flexible and scalable and secured.

Our remote surveillance system package consists in several complementary modules each of them being an optional added value.

A targeted risk analysis module whose goal is to determine some specific risk mitigation parameters depending on the physical area to be monitored and its context. These parameters include but are not limited to the following factors:
     - Number and position of digital video cameras,
     - Location of the digitizing appliances,
     - Length and positioning of video cables,
     - Localization of the monitoring room and location of the storage facility,
     - Network requirements.

An architecture analysis and design module whose purpose is to conceive surveillance architecture with the desired functionalities and project's specific constraints. This module includes the choice of the surveillance system components thus providing consistency:
     - Digital video camera type (e.g. video output, dome, IR),
     - Digitizer type (e.g. video input, output interface),
     - Digitizing appliance type (e.g. OS, CPU speed, interfaces),
     - Network architecture,
     - Connectivity tools (e.g. openVPN, SSH, VNC),
     - Storage facility,
     - Remote connections security.

A project management module which allows a complete coordination of a surveillance system project life cycle. It usually includes the following major process groups:
     - Initialization (methodology e.g. agile, PRINCE2; scope and constraint e.g. time, organization),
     - Planning and project design (e.g. scope, planning team, deliverables, schedule, change management),
     - Production (e.g. surveillance system design, surveillance system prototyping),
     - Monitoring and controlling (e.g. deployment management, deliverables validation, procedures update, support),
     - Closing (e.g. live test, post implementation report).

A prototyping and validation module that provides operational set up of the heart of the surveillance system - digitizing appliances along with the system components - and that makes validation stage of the final system's implementation available. It consists in several technical set up using the latest body of knowledge in IT security:
     - Digitizing appliance OS set up (Minimum package, network),
     - Digitizing appliance internal firewall set up (IP, Port),
     - Digitizing appliance remote connection set up (e.g. openVPN, SSH, TCP wrapper, VNC),
     - Digitizing appliance video set up,
     - Surveillance system's network set up,
     - Video recordings storage set up,
     - User documentation & procedures.

Contact us to get more detailed information about our product and its implementation.

07/01/2010 - Remote surveillance system « all-in-a-box » project
We are currently working on a product oriented version of our remote surveillance system.

09/01/2009 - First implementation
First implementation of our remote surveillance system: Remote monitoring & remote storage through the Internet.

08/10/2009 - First public announcement
Solutions based on our remote surveillance system are going to be released Q3 2009.