Sec-Gate Data Gateway Kiosk
Sec-Gate Cybersecurity

Data Security Redefined

The world's leading cybersecurity brands combined in one solution - security “Made in Germany”

 

Sec-Gate: Your Solution for Secure Data Transmission and Data Verification

Sec-Gate is a comprehensive security solution designed specifically for high security environments. It provides a secure platform for data transfer and verification, enabling the protection of critical infrastructure against cyber threats, taking into account ISO 27001 security standards and KRITIS requirements.

Sec-Gate Use Cases:

Sec-Gate Icon Securely scan and manage external drives
Securely scan and manage external drives
Sec-Gate Icon Secure data transfer between different network segments
Ensure secure data transfer between different network segments
Sec-Gate Icon Security gateway to protect against cyber threats
Provide a security gateway to protect against cyber threats
Sec-Gate Cybersecurity Icon

Cybersecurity Starts Here!

Let our experts advise you without obligation.
Sec-Gate Cybersecurity Logo

Sec-Gate
Architecture

An effective cyber security strategy must include a number of key components in order to withstand the increasing complexity of cyber threats.

Sec-Gate is based on a robust technical architecture that enables the integration of multiple layers of security. Key components are the Sec-Gate Backend Server and the Analysis Backend Server, which are responsible for data analysis and centralised control. The solution supports various hardware options, from large kiosks to mobile clients.

Sec-Gate's Analysis Backend is the Heart of the Solution, Controlling Data Processing and Security Checks.

The Main Functions:

The Analysis Backend integrates several leading anti-virus solutions including Kaspersky, Avira, ClamAV, MS Defender, Sophos, ESET and Bitdefender. This multi-scanning strategy increases the likelihood of detecting threats as different AV engines have different strengths.

With Glasswall technology, the Analysis Backend removes potentially harmful content from files while preserving the original file structure. This ensures that only safe content enters the network.

Files are executed and monitored in isolated environments (sandboxes) to determine if they behave maliciously. This enables detection of threats that traditional AV scanners may not be able to detect.

Optional integration of Virustotal services, which scan files against a wide range of antivirus engines and security vendors. This provides an additional layer of security and a more complete threat picture.

The Analysis Backend uses advanced threat intelligence and analysis to identify current threats and take appropriate action. This includes the detection of zero-day exploits and other advanced threats.

The entire system is based on a zero-trust security model, where no file is considered trustworthy until it has been fully vetted and deemed secure.

Customisable rules and parameters allow flexible and precise control of analysis processes to meet specific security and compliance requirements.

Sec-Gate Main Components

Sec-Gate Kiosk App Icon
Kiosk Terminal App

An easy-to-use touch screen application for secure transfer of removable media to and from the corporate network (e.g. USB-to-USB, USB-to-network and download-to-USB).

Sec-Gate Deskop App Icon
Desktop Client App

A lightweight Windows application that provides an Explorer-like interface to access the Sec-Gate solution. Distribution and updating is done via ClickOnce, which does not require administrator rights.

Sec-Gate Web App Icon
Web App

Offers the same functionality as the desktop application, but without the need for a dedicated client installation.

Sec-Gate USB Guard Icon
USB Guard

A Windows service that protects local USB ports against the use of unauthorised storage devices. This means that only USB devices marked as secure can be used.

Sec-Gate Analysis Backend Icon
Analysis Backend

Sec-Gate's Analysis Backend combines multi-AV scanning, Content Disarm & Reconstruction (CDR) and sandboxing to thoroughly scan and clean files. These technologies work together to detect and neutralise threats by removing malicious content. The system is highly customisable and supports multiple antivirus solutions for comprehensive protection.

Sec-Gate Automation Service Syncovery App Icon
Automation Service (Syncovery)

A third-party application with Sec-Gate integration for automatic file transfers and integration with other protocols and services.

 

Sec-Gate
Data Gateway Kiosk

Sec-Gate can be deployed not only as a complete Sec-Gate Analysis Backend in an existing IT infrastructure, but also as a standalone or as one or more integrated data locks. With great flexibility we support a wide range of logical use cases. Talk to us about your setup and the benefits of the Sec-Gate Data Lock Kiosk.

Make an appointment

Optimised Workflow with Sec-Gate

Sec-Gate provides a seamless and efficient workflow for managing your security processes. With automated checks and centralised data management, you can detect threats early and take immediate action. Sec-Gate's intuitive user interface allows your teams to work quickly and effectively without losing sight of the big picture.

Protect your business and simplify your security measures with a sophisticated workflow that saves time and minimises risk.

Sec-Gate Security and Privacy Benefits Icon

Security and Privacy Benefits

Zero-Trust File Protection

By combining sandboxing, multi-AV scanning and CDR, Sec-Gate provides comprehensive protection against threats.

Flexible and Customized

The solution can be tailored to meet specific customer requirements, including custom hardware solutions and branding options.

Usability

Simple and intuitive user interfaces for kiosk terminals, desktop and web applications.

Our Expertise is Your Success!

i2solutions is your strategic partner, providing comprehensive support and consultancy services to fully meet your security requirements, improve your IT security and ensure smooth and trouble-free operations.

We offer many years of experience in IT security for industrial production. Based on established standards such as IEC 62443 or DIN ISO 27001, we offer best practices, operational expertise and solutions to help you find the right balance between protection and practicality.

Your Contacts

Dr. Thomas Wiegand - Sec-Gate Cybersecurity Expert
Dr. Thomas Wiegand
Sales & Support
  •   +49 (0)2402 102994-22
  •  t.wiegand@i2solutions.de
Stephan Schopen - Sec-Gate Cybersecurity Expert
Stephan Schopen
Technical Information & Support
  •  +49 (0)2402 102994-24
  •   s.schopen@i2solutions.de

Want to Know More about Sec-Gate

Are You Interested?

We invite you to seek advice from our experts.

Please use our contact form or call us:

+49 (0) 2402 102994 - 0

We look forward to hearing from you.

Settings