Downloads

1. Fox Ruggedized DataDiode 1G

Technical Data Sheet

  • Guaranteed unidirectional flow of data at a physical level
  • Industry standard fiber optic LC connectors
  • Extended temperature and humidity range
  • Shock and Vibration resistant

2. Fox Ruggedized DataDiode 10G

Technical Data Sheet

  • Guaranteed unidirectional flow of data at a physical level
  • Industry standard fiber optic LC connectors
  • Extended temperature and humidity range
  • Tempest level-A compliant by default
  • Shock and vibration resistant: Truck, Rail, Air (non operational) ASTM D 4728

 

3. Fox PI Replicator 3.0

  • The fastest replication of High Volume PI Data Replication
  • Data replication from one or more source PI servers to one or more destination PI servers
  • Recognized by OSIsoft.
  • Keeps hackers, malware and other online threats outside the plant.

4. Fox DataDiode – Protejarea informațiilor confidențiale

Cu Fox DataDiode Appliance aveți o soluție pe mai multe domenii care reconciliază cerințele aparent contradictorii de securitate înaltă și fluxuri de informații rapide și eficiente.
Conectivitatea sa într-o singură direcție asigură siguranța transferului informațiilor în timp real, 24×7, menținerea celui mai înalt nivel de securitate certificat și prevenirea
accesului nedorit la informațiile și sistemele critice.

5. Fox DataDiode Appliance

Guaranteed one-way communication as turnkey solution

  • Datasheet
  • Key features
  • New capabilities and improvements
  • More information on plug and play security

6. Protecting Critical Assets and Production Environments

A solution that protects assets from outside digital threats coming from internet and facilitates sharing of data

  • Share production data
  • Protocol data replication solutions; Modbus / OPC / PI
  • Central monitoring
  • Highest level of certification & recognition & compliance

7. Fox DataDiode for Protecting Secrets

  • Highest certifications NATO secret, CCEAL7+ and more
  • Extensive protocol support FTP, FTPS, FIPES. Windows file sharing, UDP and more
  • Zero compromise on network connectivity

8. Protecting confidential information using data diodes

  • Whitepaper
  • How to protect an isolated network against outsider cyber attacks
  • Main objectives: confidentiality, integrity and availability
  • The best possible technology: the unidirectional network connection by means of a data diode

9. Active Directory Integration

A module for the Fox DataDiode Appliance that provides easy user administration

  • Improved ease of user management functionality
  • Single-Sign-On
  • Scalable

10. Cyber Security Report 2016

The report answers the pertinent questions;

  • has your vigilance towards cyber security changed?
  • What preventive measures have you taken?
  • Are you monitoring your network?
  • Do you have an Incident Response plan in place?
  • And more…

11. Fox DataDiode Modbus Replicator

  • Transparently replicated through Fox DataDiode
  • Protecting critical production environments
  • Highest certified IT security product in the world
  • Establish the most secure and safe production facility possible

12. Fox DataDiode OPC Replicator (UA & Classic)

  • Facilitate network separation
  • Provide highest security level
  • Protect against cyber threats directed at production networks
  • Replicate OPC Servers through Fox DataDiode

 

13. Secure One-Way Traffic

British government deploys data diode for data protection

  • Customer Case
  • FCO Services, part of the Foreign and Commonwealth Office
  • Rigorous data protection
  • Real-time access to information

14. One-way traffic in Italy

Datadiode deployed by Defence

  • Customer Case
  • Preventing data leaks
  • Protecting critical infrastructures
  • Highly classified
  • Small suppliers increasingly important

15. Situational awareness important in command post exercise

  • Defence: experimenting in major peregrine sword exercise
  • Customer Case
  • Deployment of Fox DataDiode
  • Encrypting reconnaissance images
  • Maintaining secrecy
  • Innovation spearhead

16. 2015 Cyber Security Infographic

Have a look at our survey results;

  • How confident are you about your defense mechanisms?
  • Are you using digital forensics to interpret digital traces?
  • Are you monitoring your network?
  • Do you have an Incident Response plan in place?
  • And more…

Downloads

Fill out the form, then you can proceed to download the documents of your choice.

Fill out my online form.