TLZ-Fullsize

Trusted Layer Zero

The First Seamless User-to-the-Cloud Infrastructure Protection System.

Trusted Layer Zero (TLZ) is the union of three distinguished product arenas:

  1. IPS Container = The system begins with a GSA Approved, Class 5, non-intelligent physical barrier to protect classified network devices. Trusted Systems’ IPS container is what some in the classified security industry have affectionately referenced as a box-sized SCIF.
  2. SafeGuard = Remote, IP-addressable monitor, alarm and control system. SafeGuard is network-centric, instead of facility-centric, and provides proactive threat detection and deterrents, rather than reactive in the wake of a breach.
  3. UserGuard = Desktop User Authentication, securing the weakest link in the network; the last 6 feet to the user.   Utilizing the latest techniques in identity recognition, UserGuard ensures the human interface is as secure as the rest of the network.

Why Trusted Layer Zero?

  • Network-centric, autonomous from facility
  • Seamless security from the user to the cloud
  • Modular, scalable, transportable, non-obsolescent
  • Proactive threat driven intrusion protection
  • Offsets capital costs for facility build outs
  • Reduced manpower and O & M costs

No.1 Reason to Implement Trusted Layer Zero?

no-wikileaksKeep the Insider Out!

 GSA Approved Class 5 IPS Container

IPS Classified Security Container

Click for more information on IPS Containers

TLZ Begins with a Strong Foundation

The strength in a system begins in the foundation, and every Trusted Layer Zero system begins with a Class 5, GSA Approved, IPS (Information Process System) security container.

The IPS container is highly configurable, available in numerous sizes, mobile, and proven to be battleship tough.  A broad selection of options are available to fit your exact requirements, to include:

IPS Container Size Options
Multiple Configuration Options
TEMPEST Shielded Security Options

TLZ Adds a Proactive Status Monitoring System

Always “On Duty”, never needing a break, and automatically initiating proactive security responses at the slightest detection of intrusion efforts, SafeGuard lets the security officer rest easy knowing the classified network is beyond the reach of malicious intent.

SafeGuard Features:

  • Continuous Remote Monitor and Alarm System
  • IP-Addressable from any Web-based Source
  • Centralized Monitoring of Multiple Locations
  • Immediate Proactive Response to Threat Alert
  • Capable of “Zeroizing” Crypto Devices
  • Monitors & Detects Dial Rotation
  • Monitors Lock Status and Door Position
  • Reports Power Consumption
  • Detects Internal and External Temperature and Humidity

Optional Configuration:

SafeGuard’s early threat detection capabilities can be enhanced with the addition of CableGuard, incorporating a vibration sensor, CCTV, and the InterceptorTM alarmed fiber PDS.  With CableGuard, SafeGuard becomes a highly sensitive, end-to-end network monitor, able to instantly initiate proactive alarms and – if necessary – shutdown procedures.

With SafeGuard’s hyper-sensitive detection and lethal alarm capabilities, some might think it’s like using a hair-triggered Howitzer to hunt varmints.  However, we believe when it comes to protecting classified information, rats can never be dead enough.

Click for more information on SafeGuard

SafeGuard

SafeGuard-front-back
SafeGuard-BlockDiagram-2-1000w

TLZ Completes the System with User Authentication

UserGuard-zoom-1000w

UserGuard Secures the Last 6 Feet to the Desktop

With UserGuard, an authorized user is restricted to network access only through desktop peripherals, not the network devices.

And inadvertent or malicious unauthorized users are prevented from accessing the network through UserGuard’s combination of :

  • Two-factor authentication at desktop (CAC + PIN)
  • User administration from inside IPS container
  • User Proximity detector to automatically disable KVM interface when authorized user walks away from workstation without first logging off
  • Instant-Off Panic button to disable user interface if authorized user detects an unauthorized presence
  • and rapid integration of new technology to neutralize emerging threats

UserGuard answers the concern of how to keep the insider out.  Personnel may be authorized for access to a secure facility, but UserGuard will prevent access to the network.  And even though an authorized user is allowed access to the network, it is UserGuard that prevents their unauthorized access to the network equipment and mass storage devices.

Click for more information on UserGuard

TLZ-Diagram-1000w