Proactive security technology for the future;
nothing get’s in, nothing get’s out
The Bitidentify SDL system gets its proactive security from two intertwined technologies: Linux and Virtualization. Our Linux OS (Host) provides a stable and secure platform that in turn uses virtualization to run another OS (Guest) on top of it. Finally the Guest OS is split into two modes by the Host, Open & Secure, with different software/hardware properties. Each instance of the Host runs separately, and the user switches between them at the push of a button.
Open Machine is open to the Internet but closed to LAN
This Machine is for daily Internet-related tasks such as email and browsing the Internet. It's not connected to LAN to eliminate the risk of spreading malware to other computers.
Secure Machine is closed to the Internet but open to LAN
This is where you work on sensitive information safe in the knowledge that there is no possible way for that data to leave your computer without your express consent.
Core technology: Linux
Built on the worlds most secure OS: Linux
Linux is in everything in your daily life, from Android phones to supercomputers. It’s also what powers our system since it’s far less vulnerable to attacks than any other OS. Our implementation is a custom bare-bones kernel built for security.
Core technology: Virtualization
Layered security trough Virtualization
Virtualization refers to running multiple operating systems on a single computer simultaneously. In our system, a custom Linux core is using virtualization to run Windows on top of it. With this implemenation our Linux core is controlling all hardware and software running on the computer making it much more secure than a standard PC.
Dual working environments
Two computers in one PC, virtually possible
With virtualization technology, our Linux core creates two separate working environments. The first is the Open Machine with Internet-connection and the second is the Secure Machine without Internet. The user switches between these two environments depending on the need.
Fastest OS-Switching in the Industry? Probably
Switching between the Open and Secure Machine is quick and easy. Just hit the shortcut keys and you’re up and running. With Bitidentify SDL installed on an SSD-drive it only takes around 5-seconds.
Back to safety
Malware? No problem, just restore your system
If you get infected by malware, you can easily remove it with our unique Restore-function. It creates a clean backup of your system that can easily be reverted to. This works for any type of malicious code; viruses, trojans or other malware.
No harmful devices
Only allowed USB-devices for maximum security
USB-sticks used in multiple computers daily in many office environments. Each time exposed to potential infection. For this reason Bitidentify SDL’s proactive security only allows pre-approved and registred USB-devices. This feature minimizes the risk of inadvertently infecting your computer.
Total file security
Secure storage that’s invisible to anyone but you
Files stored on the Secure Machine are impossible to access from the outside, you can’t even see the partition. The only way to move a file from the Secure Machine is trough a verified and access-granted USB-device.
Non-Persistent, each restart is like the first
Malware does not stick, each time you restart your Secure Machine it’s system files are restored to original, fresh install, state. Non-Persistence can be turned on or off on both Machines, or just one, for added security and protection against malware.
A look under the hood
In this diagram, you see a simplified illustration of the different components and the way that data flows between them. At the bottom layer we have the generic computer hardware that’s running the system. The system begins with our custom Linux OS (Host), it handles the virtualization of the Open and Secure machines (Guests).
Buy Bitidentify SDL
To purchase Bitidentify SDL software, please contact us on the email below so we can tailor a quote based on your companys needs. All purchases over a single unit are discounted and the price is based on a 1-year subscription. A complete proactive security technology is just one click away!
For general inquiries regarding our product or about the company please contact . Or use the contact form on our about-us page.