TrustedFilter™ SECUREcommand - 4Secure

TrustedFilter™ SECUREcommand

TrustedFilter™ SECUREcommand enables inherently two-way, bi-directional TCP applications to operate via two physically separate unidirectional appliances, Incorporates verification engine to ensure that only legitimate data is able to cross the network boundary.

TrustedFilter™ SECUREcommand – Components

TrustedFilter™ has the capability to enable the seamless and secure flow of data on-demand between environments that would otherwise remain disconnected. Facilitating the movement of files and data across varying security classifications empowers organisations to bridge the gap, thereby enhancing user productivity and organisational efficiency.

TrustedFilter™ SECUREcommand enables inherently two-way, bi-directional TCP applications to operate via two physically separate unidirectional appliances. Incorporates verification component to ensure that only data that has passed through the TrustedFilter™ verification engine is able to cross the network boundary.

Bi-Directional Proxy

Enables inherently two-way, bi-directional TCP applications which rely on request-response architecture to operate via two physically separate unidirectional flow control appliances.

  • Supports HTTP/HTTPS, VNC, RDP and other TCP based protocols.

Verification Engine

Conducts granular verification of data across domains, effectively acting as the gatekeeper to the boundaries.

  • Enables syntactic and semantic verification of XML, JSON and complex compound schema verification of data.
  • Non-compliant data is quarantined to protect your network form malicious content.
  • Advanced HTTP Verification. Filtering HTTP Request header fields, request methods, request body fields and URL query string fields.
  • Advanced event logging with user alerts.
    Integrates with a multitude of security information and event management systems (SIEMS).
  • Provides release authority to data flows out of the secure network.
  • Provides assurance and conformity checks to the data entering the protected network.

Decryption and Re-Encryption Engine

Terminates TLS, enabling raw HTTP payload to be verified before re-establishing HTTPS

  • Decrypts TLS enabling HTTPS to be interpreted as HTTP by the verification engine.
  • Re-encrypts data on successful validation of the HTTP payload, before establishing a HTTPS connection to the destination system.

TrustedFilter: A UK Sovereign Capability

As a UK Sovereign capability, TrustedFilter is trusted by the UK Government and Ministry of Defence as of vital importance to national security and the UK’s strategic interests.

Solutions enabled with TrustedFilter™

Command and Control

Secure File Import

Secure Browse Down

Contact Us

Want to know more about 4Secure's products, services and cross-domain solutions? Engage with 4Secure's specialists to find a tailored solution. The 4Secure team offer full support through 30-day proof of concept of any solution at cost to 4Secure.

Call for a Quick Consultation

Can't wait for a response? Call us now for a quick consultation with one of our cross domain solution specialists.