Remote access with hardware encryption

Remote access with hardware encryption

Share post

ECOS Technology specialist for highly secure remote access and home office, is expanding the SECURE BOOT STICK product family. With the new ECOS SECURE BOOT STICK [HE], a variant with hardware encryption is now available.

The encryption of all security-relevant partitions ensures a particularly high level of protection despite the small form factor of the stick. This enables the remote access solution to be used in areas with strict security requirements. A strong 2-factor authentication is realized at the same time through a cryptographic key integrated in the hardware.

Specially hardened ECOS operating system

The ECOS SECURE BOOT STICK [HE] can be used on any PC. With the stick connected, the specially hardened ECOS operating system is started on a hardened Linux basis. A highly secure remote access to the desired terminal server or virtual desktop infrastructure or web applications is established. This allows, for example, the quick, easy and inexpensive setup of home office workplaces.

Since no data is stored on the PC or notebook used, nor is there access to installed operating systems or other software, a complete separation between business and private use of the respective computer is guaranteed. This means that private computers or older notebooks that already exist within the organization can be used without any problems, without having to compromise on the level of protection or performance. By not purchasing new devices, significant savings are possible in many cases.

Stick with a comprehensive security concept

ECOS SECURE BOOT STICK [HE]

ECOS SECURE BOOT STICK [HE] is now a variant with hardware encryption (Image: Ecos)

The ECOS SECURE BOOT STICK [HE] also offers a comprehensive security concept beyond hardware encryption. Bootloaders, firmware and applications, for example, are digitally signed and verified using a “chain of trust” process. An integrated firewall blocks attacks in the same network and ping requests. Use in a virtual environment is also prevented. When the stick is removed, an immediate logout occurs automatically, which provides additional security on computers that are used by several people. The process of updating firmware and applications is also specially secured.

“Given the current situation, the demand for remote access and home office solutions is still high. Many companies, authorities and organizations that implemented appropriate solutions out of necessity very quickly in spring 2020 are now dealing more intensively with the topic of security. With the new, hardware-encrypted variant, we are offering interested parties an additional option within the SECURE BOOT STICK portfolio, ”says Paul Marx, Managing Director of ECOS Technology GmbH.

More about this at ECOS.de

 


About ECOS Technology

ECOS Technology GmbH has specialized in the development and sale of IT solutions for highly secure remote access as well as the management of certificates and smart cards. The core products that are used in a wide variety of industries include the ECOS SECURE BOOT STICK and the PKI appliance ECOS TRUST MANAGEMENT APPLIANCE. Companies, authorities and organizations are thus able, for example, to create, extend or withdraw their own certificates, to connect employees in the home office, to provide quickly usable, cost-efficient emergency workplaces for crises or to maintain industrial plants remotely in a safe and secure manner. Thanks to the cost-optimized thin client solutions from ECOS, hardware costs can also be massively reduced in many scenarios (lifecycle extension). ECOS has been dealing with IT security in the context of network infrastructures since 1999. The German company is headquartered in Oppenheim near Mainz.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more