Remote access for the armed forces and companies with security protection

Share post

The new ECOS SECURE BOOT STICK [ZX] is approved for secure access to data of the VS-NfD, NATO-Restricted, EU-Restricted and for the Bundeswehr. 

Remote access even in particularly sensitive, security-critical areas: With the new SECURE BOOT STICK [ZX], ECOS Technology presents a solution for high-security remote access that is tailored to the special requirements of federal authorities, the armed forces, NATO and companies with secret protection.

Slot for ID-1 format badges

The new ECOS SECURE BOOT STICK [ZX] has been approved by the Federal Office for Information Security (BSI) in combination with the genuscreen VPN appliance from genua for access to data of the VS-NfD, NATO-Restricted and EU-Restricted categories. In addition to other ECOS solutions, the remote access solution has a slot for service cards in ID-1 format. This enables, for example, the use of the Bundeswehr troop ID or other ID cards and PKI cards as an additional factor for secure user authentication.

Multi-factor authentication

The ECOS SECURE BOOT STICK [ZX] can be used on business as well as any private PCs and notebooks and offers a comprehensive security concept of cascading measures. When the stick is plugged in, the specially hardened ECOS operating system is started on a hardened Linux basis, which serves as the basis for highly secure access to corresponding terminal servers, VDI systems or web applications. A keypad for entering the PIN is integrated directly into the stick. Multi-factor authentication is thus implemented using a stick, login data and ID-1 card.

Separation between business and private use

ECOS SECURE BOOT STICK [ZX]

ECOS SECURE BOOT STICK [ZX]

There is no data storage on the computer used. Installed operating systems or other software solutions are not activated. In addition to security, this also ensures a complete separation between business and private use of the respective end device. This creates the prerequisite for implementing flexible and cost-effective home office and remote access scenarios, since no additional output from government or company computers is required.

"Thanks to BSI approval, the new ECOS SECURE BOOT STICK [ZX] can be used to access the Bundeswehr network remotely, for example, as well as handling sensitive data and applications," says Paul Marx, Managing Director of ECOS Technology GmbH. “Here - well beyond the current pandemic situation - the compatibility of work and family is a central aspect that is playing an increasingly important role for the Bundeswehr as an employer. Application possibilities arise not only with the soldiers of the Bundeswehr, but also within the framework of civil-military cooperation, with industrial partners, civilian personnel, authorities and companies under the protection of secret. "

More at ECOS.de

 


 

About ECOS Technology

ECOS Technology GmbH has specialized in the development and sale of IT solutions for highly secure remote access as well as the management of certificates and smart cards. The core products that are used in a wide variety of industries include the ECOS SECURE BOOT STICK and the PKI appliance ECOS TRUST MANAGEMENT APPLIANCE. Companies, authorities and organizations are thus able, for example, to create, extend or withdraw their own certificates, to connect employees in the home office, to provide quickly usable, cost-efficient emergency workplaces for crises or to maintain industrial plants remotely in a safe and secure manner. Thanks to the cost-optimized thin client solutions from ECOS, hardware costs can also be massively reduced in many scenarios (lifecycle extension). ECOS has been dealing with IT security in the context of network infrastructures since 1999. The German company is headquartered in Oppenheim near Mainz.

 


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more