Developers: | Sieyen (CAN) |
Date of the premiere of the system: | 2014/12/15 |
Last Release Date: | 2016 |
Technology: | Cybersecurity - Information loss preventions |
STROM — USB - a complex of the unidirectional transfer from USB carriers is intended for connection to the personal computer (stationary or figurative) processing information which is the state secret with a signature stamp not above is "confidential", removable USB information media in a read mode, without a possibility of information output on the removable medium. It is confirmed with the positive Decision of FSB of Russia received by Sieyen company.
Thus, the possibility of use of widespread, compact and convenient USB drives for information input in the protected system is provided. Along with it the impossibility of information leak from the protected system through USB ports is guaranteed. The unidirectional data transmission from USB carriers is provided at the hardware level. In CTPOM-USB there is an identification of removable mediums on the class Mass Storage Device for prevention of connection to the system of other USB devices to a possibility of external impact on it. In KOP of USB the mechanism which allows using means of the operating system of the protected computer to define the fact of connection to the system of the external USB device directly that gives the additional mechanism of control of loyalty of employees is implemented.
2016: Complex of the unidirectional transfer STROM —USB-2
In 2016 the Sieyen company receives the positive Decision of FSB of Russia on a complex of the unidirectional CTPOM-USB-2 broadcast permitting it use in the automated information systems processing and keeping information which is the state secret with a signature stamp to "top secret" inclusive.
The complex of the unidirectional transfer from USB carriers STROM —USB-2 (KOP of USB) is intended for connection to the personal computer (stationary or figurative) processing confidential information, removable USB information media in a read mode without a possibility of information output on the removable medium. Thus, before you one of solutions on data loss prevention via removable USB carriers.
As a result KOP of USB allows to use USB carriers for information input in the protected system, without being afraid of a possibility of leakage of confidential data through USB ports. The complex will find application in systems which cannot be for safety reasons connected to open information and telecommunications networks, but for normal functioning require obtaining information from external networks. It is possible to give need of a software update, anti-virus bases, etc. as examples of similar tasks.
In CTPOM-USB-2 found development well proved technical solutions implemented in our previous development - the system of safe input from CTPOM-USB USB carriers. Implementation of the unidirectional data transmission from USB carriers is provided at the hardware level. The complex provides protection of the device to which the USB carrier from a possibility of external influence is connected. It is implemented by identification of the connected removable mediums. Connection of the devices only identified on the class Mass Storage Device is allowed. In case of connection to a product of the USB device of other class (the modem, the manipulator, the camera, the printer, phone, the adapter, etc.) initialization of the attached device is not made. In CTPOM-USB-2 the mechanism which allows to modify the code and serial number of the connected USB information medium is implemented. It gives the chance using means of the operating system of the protected computer to define the fact of connection to the system of the external USB device directly what allows to provide control of loyalty of employees and to identify the internal violator.
Application of CTPOM-USB-2 will be interesting to the commercial structures working with confidential information and especially to the state organizations processing and storing the personal data and data which are the state secret. Existence of allowing documents of the regulator provides fulfillment of requirements of information security when using a complex of the unidirectional transfer as a part of automated information systems processing confidential information. Used when implementing technical solutions guarantee safety of data in systems when using a complex of the unidirectional transfer from USB carriers STROM —USB-2.