
CrossinG by ChapsVisionChapsVision
An integrated security device, CrossinG® by ChapsVision allows you to isolate a critical network, filter and clean up content exchanged with an open network.
Vendor
ChapsVision
Company Website
Product details
CrossinG® by ChapsVision is a high-performance, integrated cybersecurity device designed to protect sensitive information systems by isolating critical networks and controlling data exchanges with open networks. It ensures confidentiality, integrity, and traceability of all transfers, preventing malicious content propagation and unauthorized access. CrossinG® is compliant with major cybersecurity standards and regulations, making it ideal for sectors requiring strict network partitioning and secure communication.
Features
- Network Isolation & Flow Control:
- Physically isolated network interfaces.
- Configurable in unidirectional (diode) or bidirectional modes.
- Two isolated transfer channels (A to B and B to A).
- Content Filtering & Sanitization:
- Anti-virus and anti-malware scanning.
- Signature and label verification.
- CDR (Content Disarm & Reconstruction).
- Integrity and format checks (e.g., .exe, malformed files).
- MIME type and extension whitelisting.
- Neutralization via conversion of text, PDF, Office, and image files.
- Automatic document watermarking.
- Transfer Management & Monitoring:
- Drag-and-drop transfer control.
- Sender authentication and traceability.
- Centralized administration console.
- Privileged Access Management (PAM) compatibility.
- High-volume processing and clustering capabilities.
- Compliance & Standards:
- Military Programming Law (LPM).
- NIS Directive for OSEs.
- IEC 62443.
- II901.
Benefits
- Robust Network Protection:
- Prevents remote control attempts, cascading contamination, and data leakage.
- Customizable Security Policies:
- Define file types and transfer directions based on operational needs.
- Operational Efficiency:
- High transfer performance with centralized control.
- Regulatory Compliance:
- Meets stringent cybersecurity standards for critical infrastructure.
- Versatile Deployment:
- Applicable across multiple sectors including energy, media, IT, and defense.
- Traceability & Auditability:
- Full logging and monitoring of all data exchanges and sanitization processes.