Proactive security technology for the future; nothing get’s in, nothing get’s out
The Bitidentify SDL system gets its proactive security from two intertwined technologies: Linux and Virtualization. Our Linux OS (Host) provides a stable and secure platform that in turn uses virtualization to run another OS (Guest) on top of it. Finally the Guest OS is split into two modes by the Host, Open & Secure, with different software/hardware properties. Each instance of the Host runs separately, and the user switches between them at the push of a button.
Open Machine has Internet-connection but no LAN-connection.
This Machine is for daily Internet-related tasks such as email and browsing the Internet. It’s not connected to LAN to eliminate the risk of spreading malware to other computers.
Secure Machine has LAN-connection but no Internet-connection.
Since it’s not connected to the Internet it’s impossible to hack or infect with a virus. Here you can safley work with sensitive information.
Built on the worlds most secure OS: Linux
Linux is in everything in your daily life, from Android phones to supercomputers. It’s also what powers our system since it’s far less vulnerable to attacks than any other OS. Our implementation is a custom bare-bones kernel built for security.
Dual working environments
Two computers in one PC, virtually possible
With virtualization technology, our Linux core creates two separate working environments. The first is the Open Machine with Internet-connection and the second is the Secure Machine without Internet. The user switches between these two environments depending on the need.
Fastest OS-Switching in the Industry? Probably.
Switching between the Open and Secure Machine is quick and easy. Just hit the shortcut keys and you’re up and running. With Bitidentify SDL installed on an SSD-drive it only takes around 5-seconds.
Back to safety
Virus? No problem, just restore your system
If your computer get’s infected by a virus, you can easily remove it with our unique Restore-function. It creates a clean backup of your system that can easily be reverted to. This works for any type of malicious code; viruses, trojans or other malware.
No harmful devices
Only allowed USB-Devices for maximum security
In many office environments, USB-sticks used in multiple computers daily. Each time exposed to potential infection. For this reason Bitidentify SDL’s proactive security only allows pre-approved and registred USB-devices. This feature minimizes the risk of inadvertently infecting your computer.
Total file security
Secure storage that’s invisible to anyone but you
Files stored on the Secure Machine are impossible to access from the outside, you can’t even see the partition. The only way to move a file from the Secure Machine is trough a verified and access-granted USB-device.
A look under the hood
In this diagram, you see a simplified illustration of the different components and the way that data flows. At the bottom we have the physical computer hardware that’s running everything. The system itself begins with our custom Linux OS (Host). It handles the virtualization of the Open and Secure Machines (Guests).
Notice how all data going to the Guest Machines passes trough the Host first. Consequently, a hacker would have to get access to the Host before getting access to the Guests Machines. That is no small feat considering our Host is a custom-built Linux OS optimized for security.
Give us your numbers and we’ll give you a good deal
To purchase Bitidentify SDL software, please contact us on the email below so we can tailor a quote based on your companys needs. All purchases over a single unit are discounted and the price is based on a 1-year subscription. A complete proactive security technology is just one click away!
For general inquiries regarding our product or about the company please contact . Or use the contact form on our about-us page.