CyberSecurity

Protect your sensitive infrastructure from the cyber-attacks that threaten you.

With Crossing, the secure exchange gateway for organizations, you isolate critical resources, filter and unpack content exchanged with an open network. In short, you simply monitor and decide what goes in and out of your networks.

Enable controlled and secure exchanges between open and sensitive networks

Isolate your critical resources and protect them from network attacks

Ensure a smooth user experience and integration into the business environment

Facilitate compliance
with regulations and cybersecurity best practices.

A secure exchange gateway

CrossinG allows you to control flows, guarantee confidentiality and integrity of exchanges between two information systems, while maintaining strict separation between networks of different sensitivities.

Strong partitioning and content analysis prevent the risk of an attack spreading from one network to another, the injection of malicious content and data leakage.

Delivered as an integrated, multi-functional appliance, CrossinG provides transfer performance, ease of operation, and compliance assurance.

CrossinG provides effective protection for critical networks that cannot be satisfied with a firewall.

An integrated safety device

CrossinG can isolate a critical network, filter and clean up content exchanged with an open network, and :

  • Verify the integrity of incoming files and protect the network from malicious content
  • Filter outgoing files and reduce the risk of data leakage
  • Block cascading infection by breaking the network
  • Block any attempt to remotely take control of a system, machine or sensor

An integrated safety device

CrossinG can isolate a critical network, filter and clean up content exchanged with an open network, and :

  • Verify the integrity of incoming files and protect the network from malicious content
  • Filter outgoing files and reduce the risk of data leakage
  • Block cascading infection by breaking the network
  • Block any attempt to remotely take control of a system, machine or sensor

Easily monitor and decide what goes in and out of your networks

Configurable in single-(diode) or bi-directional modes, CrossinG allows you to define a specific security policy based on the direction of the transfer. It is possible to allow only certain types of files to enter or leave, or even to prohibit all incoming or outgoing files at any time.

CrossinG also ensures the traceability of all transfers and cleanup processes.

Safety features

  • Isolation by network break
  • 4 physically isolated network interfaces
  • Unidirectional flow (diode)
  • Two isolated unidirectional transfer channels, A to B and B to A
  • Antivirus and antimalware control
  • Signature and label checking
  • High transfer performance
  • High volume processing capability
  • Centralized administration console for input and output, administration and monitoring
  • Clustering
  • Sender authentication and traceability
  • Drag and drop transfer control
  • Compatibility with Privilege Access Management (PAM)
  • CDR – Content Disarm & Reconstruction
  • Integrity and format checking (.exe, hidden workloads, malformed files…)
  • Whitelist file filtering (MIME + extension)
  • Neutralization by conversion of text, PDF, Office and image files
  • Automatic document watermarking

The CrossinG gateway complies with the partitioning and filtering rules to which OVIs are subject under the French Military Planning Act (LPM). It also complies with the NIS directive for OESs, the IEC 62443 standard and the II901.

Contact our Cybersecurity experts:

By submitting this questionnaire, I agree that ChapsVision CyberGov may process, collect and use my data. See the ChapsVision CyberGov Privacy Policy.