SDoT Product Family

Cross Domain Solutions Made in Germany for the toughest and most sensitive environments worldwide

Key Features

L4 Microkernel OS with Secure Boot
Hardened HSM
Hardware Separation
DoS Mitigation
Secure Administration
DEU SECRET
NATO SECRET
EU SECRET
Icon: Certified
EAL4+ Level

 

 

SDoT Microkernel OS (MOS)

All SDoT products use SDoT MOS, a proprietary microkernel operating system with proven security and separation mechanisms. Vulnerabilities like buffer overflows, memory leaks or deadlocks are avoided. Compared to standard operating systems such as Linux or Windows with a 15 to 50 million lines of code, SDoT MOS has only 15,000 lines of code. SDoT MOS is based on the L4 microkernel (µ-kernel) family, which goes back to the work of German computer scientist Jochen Liedtke. Other variations of L4 are used in Apple processors, Qualcomm chips or for autonomous systems (e.g. drones).

 

Overview of SDoT products

 

Bi-directional data exchange and filtering of structured and unstructured data objects.

Read more

For scenarios that require high-speed, low latency data filtering of structured data objects.

Read more

The fastest software based Data Diode in the World with a German, EU and NATO SECRET accreditation

Read more

Application independent data classification with tamper proof and NATO STANAG 4774/8 compliant XML security labels.

Mehr Info

SDoT Classified Information Registry – Manage digital and physical classified information

Mehr Info

SDoT Cross Domain Solution Scenarios

 

Cross Domain Solution Scenarios

The Secure Domain Transition (SDoT) product family allows controlled unidirectional or bi-directional exchange of data between networks/systems of different sensitivity level as well as the creation of NATO STANAG 4774/8 compliant and tamper proof security labels. The SDoT product family offers the most comprehensive cross domain solutions on the market for network security and data leakage prevention (DLP). SDoT products enable digitization in sensitive or highly critical areas, as data is exchanged and made available in a controlled manner while sensitive data remains protected.

What are Cross Domain Solutions?

 

Test Now

Schedule POC

Request a Proposal

Contact Sales

Discuss use-case

Contact a Solution Architect