Skip to main content

Intelligence assured

Subscribe to future blog posts featured in our newsletter

Read more about how we handle personal data


Customers in the defence industry have strict requirements

Not everybody can be a producer for the defence industry. To design, develop and produce products for the national security segment requires control of all aspects in the development project as well as all aspects of the product. No question can be left open, answers must be provided.

The questions range from “who has access to change the design?” and “do the production personnel have correct security clearance?” to “how can one make sure that there are no covert channels?” and “how do we make sure an internal failure does not affect the security?”.


High assurance solutions needed

The defence industry requires high assurance solutions. Assurance is something that must be included from the start of a product design by the correct development processes and security mechanisms. It cannot be added or tested afterwards.

High assurance solutions are much more than the technical functionality a product provides.

Every step in the development, from design to the aftermarket, must be controlled to ensure high assurance.

All customers can benefit from this know-how

Being a trusted supplier for defence organisations, the products we offer have been well proven in highly operative environments, have multiple security functions to mitigate defence related threats and are used for communication up to TOP SECRET.

top secret

We are using this know-how daily when designing solutions for all customers, in all segments, including critical infrastructure and the private sector. With our products and services customers can take full advantage of the digitalisation without jeopardising security. As our products are future-proof, today's critical information is well-protected even with tomorrow's technological development.

Want to learn more about our high assurance products for cybersecurity?

Visit our products overview page


Every day most of us work with several different systems. Through our computer and other digital devices we access information that is physically in a completely different place. For example, to monitor a facility, one is often dependent on being able to access information remotely. It is simply not practical that the person who is to monitor must always be in the same physical location as the system to be monitored.

But with a remote connection, risks are also introduced.


How do you ensure that this remote access does not open more possible attack vectors for a potential attacker?

To use remote access to an operating system, such as an Operational Technology system, in a secure manner, you need to introduce a security solution that controls the asset, and which filters the information that is intended to be transferred. The user is then guided to the systems they have access to on the ICS/SCADA-network.

maintain security

The information is filtered so that only keystrokes are passed through in one direction and images of the computer screen in the other. Through these measures, you can ensure that potential attacks cannot reach the ICS/SCADA-network and at the same time make it impossible for unauthorised information withdrawals.

Do you want to know more?

Read our solution description about secure remote access