Remote access for the armed forces and companies with security protection

Share post

The new ECOS SECURE BOOT STICK [ZX] is approved for secure access to data of the VS-NfD, NATO-Restricted, EU-Restricted and for the Bundeswehr. 

Remote access even in particularly sensitive, security-critical areas: With the new SECURE BOOT STICK [ZX], ECOS Technology presents a solution for high-security remote access that is tailored to the special requirements of federal authorities, the armed forces, NATO and companies with secret protection.

Slot for ID-1 format badges

The new ECOS SECURE BOOT STICK [ZX] has been approved by the Federal Office for Information Security (BSI) in combination with the genuscreen VPN appliance from genua for access to data of the VS-NfD, NATO-Restricted and EU-Restricted categories. In addition to other ECOS solutions, the remote access solution has a slot for service cards in ID-1 format. This enables, for example, the use of the Bundeswehr troop ID or other ID cards and PKI cards as an additional factor for secure user authentication.

Multi-factor authentication

The ECOS SECURE BOOT STICK [ZX] can be used on business as well as any private PCs and notebooks and offers a comprehensive security concept of cascading measures. When the stick is plugged in, the specially hardened ECOS operating system is started on a hardened Linux basis, which serves as the basis for highly secure access to corresponding terminal servers, VDI systems or web applications. A keypad for entering the PIN is integrated directly into the stick. Multi-factor authentication is thus implemented using a stick, login data and ID-1 card.

Separation between business and private use

ECOS SECURE BOOT STICK [ZX]

ECOS SECURE BOOT STICK [ZX]

There is no data storage on the computer used. Installed operating systems or other software solutions are not activated. In addition to security, this also ensures a complete separation between business and private use of the respective end device. This creates the prerequisite for implementing flexible and cost-effective home office and remote access scenarios, since no additional output from government or company computers is required.

"Thanks to BSI approval, the new ECOS SECURE BOOT STICK [ZX] can be used to access the Bundeswehr network remotely, for example, as well as handling sensitive data and applications," says Paul Marx, Managing Director of ECOS Technology GmbH. “Here - well beyond the current pandemic situation - the compatibility of work and family is a central aspect that is playing an increasingly important role for the Bundeswehr as an employer. Application possibilities arise not only with the soldiers of the Bundeswehr, but also within the framework of civil-military cooperation, with industrial partners, civilian personnel, authorities and companies under the protection of secret. "

More at ECOS.de

 


 

About ECOS Technology

ECOS Technology GmbH has specialized in the development and sale of IT solutions for highly secure remote access as well as the management of certificates and smart cards. The core products that are used in a wide variety of industries include the ECOS SECURE BOOT STICK and the PKI appliance ECOS TRUST MANAGEMENT APPLIANCE. Companies, authorities and organizations are thus able, for example, to create, extend or withdraw their own certificates, to connect employees in the home office, to provide quickly usable, cost-efficient emergency workplaces for crises or to maintain industrial plants remotely in a safe and secure manner. Thanks to the cost-optimized thin client solutions from ECOS, hardware costs can also be massively reduced in many scenarios (lifecycle extension). ECOS has been dealing with IT security in the context of network infrastructures since 1999. The German company is headquartered in Oppenheim near Mainz.

 


 

Matching articles on the topic

Risk: High API growth without sufficient IT security 

A study shows that nine out of ten decision makers know that APIs are a Trojan horse for cyberattacks - but the ➡ Read more

Major hack at Dropbox Sign

Sign, the Dropbox service for legally binding electronic signatures on contracts and the like, must report a cyberattack. E-mail addresses, user names, ➡ Read more

Cybersecurity through anomaly threat detection

Claroty's Medigate platform receives an important expansion with the Advanced Anomaly Threat Detection (ATD) module for anomaly threat detection. Obtained thereby ➡ Read more

LockBit is back: cyber attack on KJF with 17 clinics and schools 

The KJF - the headquarters of the Catholic Youth Welfare Department of the Diocese of Augsburg e. V. suffered an extensive cyber attack. The hackers around ➡ Read more

EU cybersecurity certification

With the “European Cybersecurity Scheme on Common Criteria” (EUCC), there is now a first systematic approach to certifying cybersecurity. ➡ Read more

Encrypt sensitive Microsoft 365 data

For public sector entities and systemically important utilities that fall under KRITIS guidelines, the rules for data security are repeated ➡ Read more

DORA in response to cyber attacks in the financial sector

The number of cyber attacks on the financial sector is increasing worldwide, and according to financial regulators, cyber attacks are also occurring in Germany ➡ Read more

Fatal: Managing directors consider awareness training to be unnecessary

A representative survey shows that almost half of German management consider important security awareness training to be unnecessary. This evaluation reveals ➡ Read more