SafeDoor® is a security device that protects computers from threats that may come from USB devices.

How does it work?

SafeDoor® is a hardware and software tool to which USB devices intended for use in our organization are connected. SafeDoor® continuously analyzes and, based on behavior, addresses the three types of existing attacks.

Environments

Operations Performed with USB

Critical Infrastructure
• Access to isolated networks and updating control equipment.
• Airgap between different networks for information transfer.

Industry
• Access to OT networks and updating control equipment.
• Airgap between IT/OT networks for information transfer.

Administration
• Digital document records.
• Secure, audited multi-user access to USB devices.

Defense
• Communication between classified networks.

Use Cases

Individual/ Mobility: Secure access to USB devices from an isolated or mobile computer. Shared: Secure and audited access to USB devices for all computers in a network with multiple users. Perimeter: Secure and audited transfer of files to an OT network for updating isolated machines via USB. Perimeter/ Customs: Secure and audited file transfer between IT/OT or classified networks bridging an AirGap using a two-phase control. Remote Transfer: Access and transfer of information to isolated destinations.

What types of threats does it detect?

SafeDoor® can detect the three types of existing threats:

Hardware attack

It appears to be a USB, but in reality, it executes commands and takes control of the system.

Electrical attack

It appears to be a USB, but it contains electrical components inside that end up physically destroying the device.

Software attack

This is indeed a completely normal USB that stores malware.
When SafeDoor® detects a threat on the connected USB, it blocks the device to protect our organization.

What else does it offer?

Management

It allows for configuring SafeDoor®'s security policies. This enables system administrators to customize SafeDoor®'s settings to meet the organization's needs.

Traceability

SafeDoor® maintains a real-time log of everything happening at the USB level within the organization, providing insights into all aspects of the use of these devices.

Auditing

It allows for tracking all USB devices connected to SafeDoor®. It reports in real time all file movements and actions performed with these devices.

Who is protected?

SECURITY CERTIFICATIONS

SafeDoor has a high level of security within the ENS
Included in the CPSTIC catalog of the CCN
AuthUSB is a NATO certified provider (listed in the BOA list of the NCIA)
In summary, SafeDoor® is an effective solution for protecting computers from threats that may come from USB devices. It offers a wide range of functionalities and features that make it ideal for organizations of all sizes.