One of the most competent companies in the world in Cyber Security solutions (accredited to “NATO Secret”, “EU / AB Secret” and below), especially for Data Diode (one-way) and Security Gateway between Domains (internet & intranet) (two-way). We are proud to be the only authorized official distributor of INFODAS, which is used in the Armed Forces of NATO and European Union (EU) member countries (drone / UAV, helicopter, aircraft, frigates and submarines, headquarters) and European Union member state units, especially the German Armed Forces. The data diode, which guarantees that all sensitive information is only allowed to be accessed by the system that needs it within the framework of the rules defined within the network architecture, also provides “Cyber Armor” against all kinds of cyber attacks that can be done from outside (including internet / wireless / GPS systems). Data Diode and Cross Domain Security Gateway solutions developed by INFODAS, in addition to protecting the armed forces of NATO countries against all kinds of cyber attack threats, NATO Network Enabled Capability (NNEC-NATO Network Enabled Capability) / Network Centered Capability ( NCC-Network Centric Capability) also ensures the safe performance of joint operations within the scope of their concepts.
Public Sector
Government and defense clients trust our IT/Cybersecurity experts and Cross Domain Solutions
Digitization affects all public sector domains. IT changes processes, services, capabilities or decision-making. Opportunities for innovation, efficiency and effectiveness gains are enormous. However, information technology also entail risks. Networked organizations and their supply chains, vehicles or other networked devices–the Internet of Things (IoT))–, combined with IT solutions in a state of permanent development and legacy systems, offer ever new attack vectors for bad actors in Cyberspace. The threat from social engineering, phishing, viruses, spyware, malware, ransomware, trojans or advanced persistent threats (APT) is constant and can affect any organization on a daily basis. Just as there can be unintended data loss or system failures. Your public sector organization needs to be prepared for both.
We have been serving the public sector since 1974 with our services and high-end security products
Client projects
Cross Domain Solutions
The Secure Domain Transition (SDoT) product family (hardware security appliances) allows to connect systems of different classification level. Our products ensure that data is made available to classified systems or that data can be securely exchanged between those systems. Only data that is allowed to leave a domain of high classification level can do so. SDoT products use filters for structured data or tamper poof security labels that are cryptographically bound to any data object for release decisions. SDoT cross domain solutions can be found in data centers, weapon systems, simulation environments or downlink stations on land and at sea around the world.
Penetration tests of classified systems
As part of its continuous improvment of the client’s Cybersecurity concept, INFODAS conducts penetration testing of classified systems. INFODAS uses specially configured audit laptops and a BSI-compliant process model. The tools used include passive scanners (e.g. NMAP) as well as active scans and system interventions (e.g. OpenVAS, Metasploit Framework).
Requirements Engineering
The client wanted to create a “Medical Command & Control System” integrated into an existing C4 system to support the work of medical first responders. In order to ensure that all requirements for the migration and functionality of the integrated system were met, INFODAS supported the verification process based on the requirements inventory and the generation of test cases.
Implementing an ISMS for a Federal State
All of Germany’s 16 federal states have agreed on common information security objectives based on BSI standard 200-1 – 200-3 (IT Grundschutz) across all of its government agencies and their subsidiaries. INFODAS Cybersecurity consultant’s are supporting all government bodies across a federal state in the process of planning and implementing an ISMS so that it can maintain a leading role in digitiztion (eGovernment) and information security.
Critical Infrastructure
Critical infrastructure clients trust our IT/Cybersecurity Consultants and Products to secure their IT/OT
Organizations from various industries and sizes are considered critical infrastructure according to the Federal Office for Information Security (BSI) and the Federal Office for Civil Protection and Disaster Assistance (BBK). An outage, even of a temporary nature, can have far-reaching consequences for a modern networked society. Therefore any vulnerability of critical infrastructure to Cyberattacks is understood as threat to national security. The German IT-Security Law puts an emphasis on critical infrastructure protection (CIP) that result in various information security requirements for providers.
An overview of critical infrastructure
– Energy- Healthcare – Financial Services – Media | IT & Telco – Water- Defense | – Transport – Food – Government |