TrustedFilter™ SECUREimpex

4Secure's TrustedFilter™ SECUREimpex offers a comprehensive range of components designed to facilitate the secure import of data. Components can be installed directly on unidirectional appliances or strategically integrated to enhance legacy systems.

TrustedFilter™ SECUREimpex – Components

TrustedFilter™ has the capability to enable the seamless and secure flow of data on-demand between environments that would otherwise remain disconnected. Facilitating the movement of files and data across varying security classifications empowers organisations to bridge the gap, thereby enhancing user productivity and organisational efficiency.

4Secure’s TrustedFilter™ SECUREimpex offers a comprehensive range of components designed to facilitate the secure import of data, while ensuring adherence to Information Assurance standards. SECUREimpex is a full-featured performant solution that’s platform agnostic. Components can be installed directly on unidirectional appliances or strategically integrated to enhance legacy systems.

Full-Featured File Transfer

Enables transfer of critical images, documents, videos, software updates and OT data across domains with ease.

  • Run as a service to provide an automated experience.
  • Configured & managed through an easy-to-use GUI.
  • Secure credential-container for application specific, authenticated file-transfer.
  • Supports Mirroring of directories, or ‘Send and Delete’ configuration.
  • Engineered to support high-throughput 24/7 enterprise environments.
  • Multiple File Transfer modes available, including scheduling options.
  • Pre-processing engine to enable user-defined filtering.
  • Compression engine to increase file transfer performance.
  • High-throughput capable of sending files up to 10gbps.
  • Enabled Anti-Virus and Malware Scanning.
  • Integrates with GlassWall for content disarm and reconstruct.

Verification Engine

Conducts granular Perform granular verification of data before or after crossing the network boundary.

  • Enables syntactic and semantic verification of XML, JSON and complex compound schema verification of data.
  • Non-compliant data is quarantined to protect your network form malicious content.
  • Advanced HTTP Verification. Filtering HTTP Request header fields, request methods, request body fields and URL query string fields.
  • Advanced event logging with user alerts.
  • Integrates with a multitude of security information and event management systems (SIEMS).
  • Provides release authority to data flows out of the secure network.
  • Provides assurance and conformity checks to the data entering the protected network.

Transformation Engine

Transforms application layer data protocols into a markup language for the purposes of granular verification.

  • Transforms customised TCP streams and many open standard TCP based protocols to be transformed into a structured markup language format, such as XML before being sent to the verification engine.
  • Reassembles data into original format, typically after the payload has been sent across the network boundary and verified.
  • Adheres to NCSC Import guidance by transformation of complex data types into a structured comprehensible format.

Decryption and Re-Encryption Engine

Terminates TLS, enabling raw HTTP payload to be verified before re-establishing HTTPS

  • Decrypts TLS enabling HTTPS to be interpreted as HTTP by the verification engine.
  • Re-encrypts data on successful validation of the HTTP payload, before establishing a HTTPS connection to the destination system.

TrustedFilter: A UK Sovereign Capability

As a UK Sovereign capability, TrustedFilter is trusted by the UK Government and Ministry of Defence as of vital importance to national security and the UK’s strategic interests.

Cross-domain solutions enabled with TrustedFilter™

Command and Control

Secure File Import

Secure Browse Down

Contact Us

Want to know more about 4Secure's products, services and cross-domain solutions? Engage with 4Secure's specialists to find a tailored solution. The 4Secure team offer full support through 30-day proof of concept of any solution at cost to 4Secure.

Call for a Quick Consultation

Can't wait for a response? Call us now for a quick consultation with one of our cross domain solution specialists.