KAZUAR Black

KAZUAR BLACK, an end-to-end hardware and software solution to protect
an organization’s most sensitive information,their reputations and the bottom line.

The solution includes KAZUAR endpoints and KAZUAR Fortress – a secure backend server.

While the solution does not alter the way the organization operates,
it does provide intelligence-grade security and offers
a level of cyber safety that no combination of existing products can offer.
Download Kazuar Black brochure

How does it work?

  • Black
  • Blue

KAZUAR End Point

The KAZUAR secure endpoint allows multiple work environments to coexist on the same hardened hardware. Communication between the two environments is managed by proprietary security protocols.
The inputs and outputs are cryptographically secured to prevent any attacks via the keyboard or display.

Secure Black mode

In BLACK mode the user works in the secure organizational environment on the Fortress, accessing sensitive company data, information, or operations. While working in the secure BLACK mode no information is stored on the KAZUAR client.
To maintain the security of the Fortress, information that comes
in and out is thoroughly inspected to ensure that it is benign.

The user can export organizational documents to the open BLUE environment. The export mechanism is controlled by an organizational security policy and managed by hardware based cryptographic lockdown to protect against attacks by malicious users as well as malicious code on the server.
Secure export
The user can easily and securely transfer information from the open Blue environment into the secure BLACK environment, without compromising the organizational environment.
Secure import
FIPS – 142/L4 certification, physical anti-tamper mechanisms with destructive fail-safes and physical side channel attacks mitigations.
Physical tampering
  • Cryptographic closed circle: The BLACK environment is protected from end-point to the server using a proprietary hardware-based cryptographic isolation.
    Pre-boot environment: Re-implemented BIOS to provide a strong, cryptographically-backed security measures
  • Secure Base-OS: Minimalist hardened operating system with additional security features as well as recovery and authenticity capabilities
  • Protection against side channel attacksSecure Keyboard: Hardware based secure communication to prevent a broad spectrum of hardware, software and driver-based keylogging attacks
  • Secure Display Output: Hardware based secure display solution to prevent screen grabbing attacks
More features

KAZUAR End Point

The KAZUAR secure endpoint allows multiple work environments to coexist on the same hardened hardware. Communication between the two environments is managed by proprietary security protocols.
The inputs and outputs are cryptographically secured to prevent any attacks via the keyboard or display.

Secure Blue mode

The BLUE mode is equivalent to a normal desktop for day-to-day use, including surfing the internet, interacting on social media and conducting any personal transactions.
The user can transfer data from the BLUE to BLACK mode via the automated cleansing mode.

The user can export organizational documents to the open BLUE environment. The export mechanism is controlled by an organizational security policy and managed by hardware based cryptographic lockdown to protect against attacks by malicious users as well as malicious code on the server.
Secure export
The user can easily and securely transfer information from the open Blue environment into the secure BLACK environment, without compromising the organizational environment.
Secure import
FIPS – 142/L4 certification, physical anti-tamper mechanisms with destructive fail-safes and physical side channel attacks mitigations.
Physical tampering
  • Cryptographic closed circle: The Black environment is protected from end-point to the server using a proprietary hardware-based cryptographic isolation.
    Pre-boot environment: Re-implemented BIOS to provide a strong, cryptographically-backed security measures
  • Secure Base-OS: Minimalist hardened operating system with additional security features as well as recovery and authenticity capabilities
  • Protection against side channel attacksSecure Keyboard: Hardware based secure communication to prevent a broad spectrum of hardware, software and driver-based keylogging attacks
  • Secure Display Output: Hardware based secure display solution to prevent screen grabbing attacks
More features

Fortress

The Fortress is a secure private cloud offering a virtualized infrastructure with high emphasis on privacy and security. The Fortress can be offered as a managed service or deployed on-premises.

Insider Attacks

The Fortress provides unique protection against highly malicious and sophisticated insider attacks (“Snowden Scenario”).

Zero Trust

KAZUAR Fortress assumes a “zero-trust approach” towards both data-at-rest and runtime execution.

Data retention approach

KAZUAR's proprietary data retention and access approach, confines infrastructure attacks, detects an on-going compromise and slows down potential attackers.

Managed solution

KAZUAR offers its cloud as a fully managed service, or as an on-premise solution

KAZUAR for Business

  • SMBs
  • Enterprise

Small and medium businesses with highly sensitive information and assets encounter high levels of cyber threat. They are susceptible because they do not have the capital to invest in heavy infrastructure and do not possess the necessary cyber security knowledge.

KAZUAR offers small and medium businesses a peace of mind with a fully managed service to secure their organization with intelligence level security. This fully managed service enables the business to completely outsource its IT and security infrastructure, to KAZUAR, from keyboard to cloud.

This solution as a service offering allows your organization to avoid any unnecessary infrastructure investment and completely concentrate on your business

For most organizations, their “critical data” represents less than 10 per cent of the data they hold. Losing this small amount of data, however, affects their operations, reputation and even shareholder value. The theft or misuse of these critical assets can literally cripple a company.
KAZUAR protects the critical assets of the organization with intelligence-agency level security for discrete projects or specific departments.

KAZUAR use cases for enterprise include:

  • Securing work environments for critical departments such as M&A or R&D
  • Working securely in compromised scenarios, such as travel
  • Securing sensitive projects executed by a subcontractor or other third party
  • Differentiating secure value-added services for significant customers
  • Perform extremely secure, high value payments.

Uniquely protected by KAZUAR

Privilege Escalation

Attackers attempt to obtain a higher level of access then a system administrator intended by performing kernel operations

Rootkit

Maliciously modified administrative tools to grant "Root" access, activated each time the system boots up

Keyloggers

Recording of keyboard strokes to collect password and confidential information

Screen Grabbers

Collects output from the screen

HDD theft

HDD theft and information leakage due to physical access and tampering

Hypervisor Compromise

Hypervisor vulnerabilities that can be exploited to gain access and allow guests to break into the hypervisor

Other common threats protected by KAZUAR

  • Spear phishing
  • Drive-by-attacks
  • Ransomware
  • Persistent attacks
  • Watering hole attacks
  • Privilege escalation

Scenarios protected by KAZUAR

  • Targeted attacks
  • Insider threat
  • Mobile workers
  • Email attachments
  • Live Intelligence & Remediation
  • Threat discovery
  • Unauthorized file transfers

NEED KAZUAR FOR YOUR ORGANISATION?

Contacts Us