
Link22
About us
At link22, we specialize in creating robust cybersecurity solutions that empower militaries, governments, and companies to safeguard their classified information. Our comprehensive product portfolio covers the following critical aspects of digital defense:
Cross-Domain Solutions: Seamlessly bridge secure communication gaps, ensuring seamless collaboration across sensitive networks.
Eavesdropping Prevention: Our turnkey solutions protect mobile devices from unauthorized listening, preserving confidentiality
Air-Gapped Solutions: We design, implement, and support offline environments, shielding critical systems from external threats.
Hardened Clients: Our off-the-shelf standalone and thin clients are purpose-built to meet stringent government regulations.
What to expect from link22:
Two Decades of Excellence: With a proven track record spanning over twenty years, we’ve deciphered complex cybersecurity challenges.
Navigating Complexity: Our clients operate within the delicate balance of strict regulations, specific functionality, and usability. We understand their unique needs.
Comprehensive Solutions: Beyond technical prowess, we provide thorough documentation and policy guidance.
Highly Experienced Team: With diverse backgrounds and extensive industry experience, our colleagues bring unparalleled expertise to every project.
Products & services

link22 Shield
link22 Shield is an advanced sound masking device designed to prevent eavesdropping via mobile phones and other electronic devices. By combining sound-isolating materials and active noise masking, Shield ensures that meetings can be conducted without the risk of recording or signal interception. Benefits of link22 Shield Protection against eavesdropping – Blocks mobile phone microphones from recording sound. Sound isolation and active noise masking – Ensures conversations remain confidential. Meets security recommendations – Complies with guidelines for recording prevention. Discreet and easy to use – Ideal for meeting rooms, conference rooms, and other secure environments. Designed and certified in Sweden – Developed to meet the highest security standards. Technical Features Sound-isolated construction – Multiple layers prevent sound leakage. Randomized noise masking – Prevents digital sound filtering from reconstructing speech. Vibration dampening – Blocks sound transmission through solid surfaces. Tamper protection – Eliminates the risk of manipulation. Portable and robust – Easy to place in any meeting room. link22 Shield is delivered with: Documentation for simplified regulatory compliance With link22 Shield, organizations can conduct meetings without the fear of eavesdropping, creating a safer and more focused work environment. Visit us at Samhällssäkerhet to see how link22 Shield can protect your organization!

Standalone computer
link22 Outpost is standalone workstation for management of sensitive information. It is a highly user-friendly solution providing essential security functions, including: - Authentication and access control using a smart card or password. - Security log. - Hardening, whereby Microsoft Windows, integrated third-party programs and BIOS are locked-down in order to minimise vulnerability to attacks. - Protection against malicious code. - Simple update management. In combination with a separate update disk, our support services make it easy to stay updated, even if Outpost is never directly connected to the internet. - Simple backup using two internal hard disks – one for data and one for backup. Data is archived to a separate external disk. More information: Outpost is a fully standalone computer without any network connection, designed to handle classified files and documents without exposure to external threats. It provides a secure working environment for organizations that demand strict information control. Use Cases Government & Defense – Secure handling of classified information without network risks. Critical Infrastructure – Protected operation of sensitive systems free from cyber threats. Healthcare – Isolated handling of patient data and research materials. Law Enforcement & Judiciary – Secure workstations for investigations and evidence management. Key Features & Benefits Offline – No network connection, no risk of cyber intrusion. Protection Against External Threats – No exposure to remote attacks or malware from the internet. Secure File Handling – Only authorized devices and media can be used. Flexible Configuration – Adaptable for various security levels and workflows. With Outpost, organizations get a high-security solution for handling sensitive data, free from network dependencies and cyber threats. Visit us at Samhällssäkerhet to see how Outpost can enhance your information security!

link22 Data Diode Zero
The 1290€ data diode, with the same level of security. One way communication is no longer expensive. With Data Diode Zero one way secure information communication finally became easy to use and therefore applicable in a vast variety of industries. More information: Data Diode Zero – Secure and Controlled Data Transfer for Critical Infrastructure In a world where cyber threats are constantly evolving, organizations need solutions that guarantee security without compromising functionality. Data Diode Zero from link22 is a high-security solution designed to protect critical infrastructure by ensuring one-way data flow and eliminating the risk of cyber intrusions. Physical Isolation for Maximum Security Data Diode Zero acts as a hardware-based barrier between networks, preventing unauthorized communication and cyber threats. With its strictly enforced one-way transfer, it enables secure data import and export without exposing protected systems to external risks. Use Cases Energy Sector – Secure transfer of critical operational data without external intrusion risks. Government & Defense – Isolates sensitive systems while enabling controlled data sharing. Transportation & Logistics – Protects connected systems in aviation, railway, and maritime sectors. Industrial Control Systems (ICS/SCADA) – Enables secure reporting from production environments. Performance and Flexibility High Throughput – Fast and efficient data transfer without bottlenecks. Minimal Configuration – Easy deployment with low operational costs. Data Diode Zero is the optimal solution for organizations that demand absolute security in their data management. Visit us at Samhällssäkerhet to explore how we can help you protect your most valuable asset – your information.

Thin clients
In a world where security, simplicity, and centralized management are crucial, Outpost Access Terminal provides a thin client solution for organizations with high demands on IT security and access control. It eliminates security risks associated with local storage and unauthorized software while offering users streamlined and role-based access to their work environments. Secure and Controlled Access Outpost Access Terminal replaces the traditional Windows desktop with a streamlined and secure user interface. Only the applications and virtual desktops that a user is authorized to access are displayed, reducing the attack surface and preventing unauthorized access to sensitive information. The client operates in kiosk mode, meaning users cannot install programs or make changes that could compromise security. All work resources are fully virtual and streamed from a central data center, ensuring no data is stored locally. Key Benefits of Outpost Access Terminal Role-Based Access Control – Only authorized applications and desktops are available to each user. High Security – No local data storage, no ability to install unauthorized software. Efficient Administration – Centralized user, permission, and resource management. Long Lifespan and Low Maintenance Costs – No sensitive hardware or software requiring frequent updates. Optimized for Secure Environments – Ideal for organizations requiring strict segmentation and protected IT environments. Use Cases Government & Defence – Protects sensitive information with strict access control. Critical Infrastructure – Secure and efficient access to virtual systems. Enterprise & Office Environments – Enables unified and centralized administration. Industry & Research – Isolated work environment to prevent data leaks. Visit us to hear more.

Cross Domain Solutions
Cross Domain Solutions by link22 enable secure and controlled data transfer between networks with different security classifications. Our solutions are used by government agencies, defense, and critical infrastructure to protect sensitive information and ensure regulatory-compliant data management. Benefits of Cross Domain Solutions Secure and regulated data transfer between protected networks Hardware-based isolation for maximum security Advanced filtering and validation of data Regulatory compliance – Well documented solutions to ease the burden of compliance related work Flexible integration – Easily adapts to existing IT environments Products in Cross Domain Solutions Data Diodes – Ensures one-way data flow, eliminating the risk of cyber intrusion. Data Guard – Controlled file transfer with advanced threat detection. Impex – Secure data import and export via offline media. Secure Print – Protected printing solution for sensitive documents. Countersign – Digital signing and review of documents in secure environments. Cross Domain Solutions ensure that only approved data is transferred while protecting against unauthorized access and malware. Visit us at Samhällssäkerhet to discover how our solutions can protect your organization!

Small Enterprise PKI
Small Enterprise PKI from link22 is a complete and user-friendly PKI solution that simplifies digital certificate management, authentication, and signing for small and medium-sized organizations. With quick installation and minimal maintenance, it provides high security without complexity. Benefits of Small Enterprise PKI Fast deployment – Ready to use immediately without advanced configuration. Automated certificate management – Efficient handling of certificates with no manual work. Secure login and access control – Protects users and systems from unauthorized access. Digital signing and encryption – Ensures the integrity of documents and communication. Regulatory compliance – Meets security and regulatory requirements. The small enterprise PKI tool supports: Independent (offline) root certificate issuers. Automatic life cycle management of certificates. Underlying certificate issuers can be independent or connected to the IT-system in question. Multiple levels of certifiers. Both soft and card-based certificates. Templates for different types of certificates. Integration with existing infrastructure, such as VPN solutions. Requesting, issuing and revoking certificates in a simple user interface. Role separation for administration of PKI and underlying IT solution. The small enterprise PKI tool is delivered in a turn-key-ready state with: A standalone computer that acts as a root certificate issuer 100 smart cards A printer for producing smart cards With Small Enterprise PKI, organizations gain a secure and straightforward solution for managing digital identities. Visit us at Samhällssäkerhet and discover how we can enhance your cybersecurity!

IMPEX CLIENT
Impex Client – Secure and Controlled Data Transfer Impex Client by link22 is a specially developed client for secure import and export of data between networks with different security classifications. With strict access control and security screening, Impex Client ensures that only approved and verified information can be transferred between systems. Benefits of Impex Computer Protection against cyber threats – Prevents the spread of malware and unauthorized data transfers. Secure file handling – Ensures all files are verified before import or export. Regulatory compliance – Delivered with thorough documentation to simplify oversight processes. With Impex Computer, organizations can manage data transfers securely and efficiently, reducing the risk of cyber threats and data leaks. Visit us at Samhällssäkerhet to see how Impex Client can protect your organization!

ENCRYPTED COMMUNICATION CLIENT
The Encrypted Communication Client from link22 enables secure and reliable file transfers between two geographically separated locations. Through VPN-protected communication and approved encryption, the solution ensures that large amounts of sensitive data can be transferred without risk of tampering, theft, or leaks. Benefits of the Encrypted Communication Client Secure file synchronization – Transfer large amounts of sensitive data safely. Customizable security – Adjust security levels based on risk and regulatory requirements. Resilient to connection issues – Transfers pause and resume automatically if interrupted. Encrypted communication – Protects against unauthorized access via VPN and strong authentication. User-friendly and flexible – Designed for government agencies, enterprises, and military organizations. Technical Features VPN-protected communication – Ensures only authorized users can transfer data. Supports large data volumes – Optimized for efficient transfer of extensive file structures. Automatic error handling – Detects connection issues and resumes transfers upon reconnection. Multiple authentication methods – Adaptable to organizational security requirements. With the Encrypted File Transfer Computer, organizations can securely and efficiently share large volumes of sensitive information without the risk of data loss or unauthorized access. Visit us at Samhällssäkerhet to see how our solution can enhance your data security!

SECURE ACCESS CLIENT
Secure Access Client by link22 provides secure and controlled connections to sensitive systems and networks. With strong authentication, encrypted communication, and role-based access control, the solution ensures that only authorized users gain access to critical IT environments. Benefits of Secure Access Client Secure remote access – Protects sensitive systems from unauthorized entry. Strong authentication – Supports smart cards, certificates, and multi-factor authentication. Encrypted communication – Secures all traffic between the client and the protected network. Role-based access control – Users can only access approved resources. Regulatory compliance – Delivered with comprehensive documentation to simplify oversight processes. Technical Features Isolated client – Prevents exposure of sensitive information on unsecured devices. Secure VPN connection – End-to-end encryption of all network traffic. No local data storage – Eliminates the risk of data leakage if a device is lost or compromised. With Secure Access Client, organizations can ensure secure and controlled remote access, enabling flexible and protected remote work without compromising IT security. Visit us at Samhällssäkerhet to see how our solution can protect your organization!

DIODE SOFTWARE
Diode Software by link22 is a standalone and hardware-independent software solution that enables secure and reliable data transfer over data diodes. Regardless of the diode manufacturer, our software optimizes performance and ensures that files, streamed data, and messages are transmitted accurately and efficiently. Benefits of Diode Software • Hardware-independent – Works with all data diodes on the market. • Secure and reliable file transfer – Supports large files and extensive file libraries. • Optimized performance – Resumes interrupted transfers and handles packet loss. • Supports multiple protocols – Enables secure transfer of both files and streamed data. Products within Diode Software Diode Transfer A high-performance solution for secure file transfer over data diodes, independent of hardware manufacturer. • Supports large files and complex folder structures. • Transfers logs, software updates, and backups. • Checksums and retransmissions ensure integrity and complete delivery. • Transfer mode and mirror mode allow flexible file transfer management. Secure Transfer Agent A software agent for encrypted and signed file transfers over data diodes. • Signs and encrypts files to protect integrity and confidentiality. • Automatic monitoring and replication of folder changes. • Supports cleartext or encrypted packaging, depending on security requirements. TCP Connector Enables secure streaming of TCP data over a physical data diode. • Supports both UDP and TCP streaming. • Secure export of sensor data and logs from protected systems. • Channels external data streams into offline environments. With Diode Software from link22, organizations can maximize the value of their data diodes, ensure accurate and reliable data transfer, and protect sensitive information from unauthorized access and manipulation. Visit us at Samhällssäkerhet to discover how our software can enhance your information security.

DATA GUARD
Data Guard by link22 is a software solution for secure file import and export, protecting IT systems from malware and unauthorized files. Through advanced scanning, filtering, and access control, Data Guard ensures that only approved and verified files are allowed to pass. Benefits of Data Guard • Secure import of files and software updates – Prevents malware from entering the network. • Advanced filtering – Identifies and blocks unwanted files based on configurable rules. • Support for antivirus and CDR – Enables the use of multiple antivirus engines and deep inspection. • Traceability and logging – Full transparency on who imports and exports files. Features of Data Guard • PKI support – Smart card authentication and transport protection using user certificates. • Inspection of confidential data – Secure file handling between security domains. • Support for countersigning – Requires approval from multiple users for exporting sensitive files. • Integration with data diodes – Added security through one-way data transfer. • Flexible installation – Can be deployed on Windows and RHEL, both physically and virtually. With Data Guard, organizations can minimize cyber threats and ensure controlled file import and export according to high security standards. Visit us at Samhällssäkerhet to discover how Data Guard can protect your organization.

DEEP INSPECTION (CDR)
Content Disarm and Reconstruction (CDR) by Glasswall provides proactive protection against unknown cyber threats and zero-day attacks. By inspecting, cleansing, reconstructing, and delivering files, CDR ensures that only secure files can be imported and exported within your organization. Benefits of Deep Inspection (CDR) • Eliminates hidden threats – Neutralizes malicious code in files without affecting content. • Protection against zero-day attacks – Stops unknown threats that traditional solutions cannot detect. • Automated file reconstruction – Creates a secure version of each file according to standardized formats. • Perfect for Cross Domain Solutions – Seamless integration with link22’s products for secure file management. • Works for both import and export – Protects information moving between security domains. How CDR Works – Four Steps 1. Inspect – The file’s digital structure is validated against the manufacturer’s specifications. Deviations are handled immediately. 2. Cleanse – Risky elements such as macros and embedded links are removed according to organizational policies. 3. Reconstruct – The file is rebuilt according to the manufacturer’s standard for a harmless file type. 4. Deliver – The user receives a secure, verified, and standardized file free from hidden threats. With Deep Inspection (CDR), organizations can proactively eliminate cyber threats and ensure that only safe files are used in their operations. Visit us at Samhällssäkerhet to discover how CDR can protect your organization.

SECURE PRINT
Secure Print by link22 ensures that only authorized users can print sensitive documents, protecting information from unauthorized access and leaks. Through secure authentication, logging, and traceability, the printing process becomes fully controlled and tailored for organizations with high-security requirements. Benefits of Secure Print • Protection against information leaks – Only authorized users can print sensitive documents. • Secure authentication – Supports smart cards and certificates for printing. • Traceability and logging – Complete history of all print jobs. • Integration with security domains – Secure printing in protected environments. • Flexible installation – Compatible with existing printers and systems. How Secure Print Works 1. Authentication – The user identifies themselves via a smart card or another secure method. 2. Verification – The system ensures that only authorized users can print. 3. Printing – The document is printed in a secure and protected environment. 4. Logging – The print job is recorded for traceability and compliance with security policies. With Secure Print, organizations can guarantee the secure printing of sensitive documents and prevent information leaks. Visit us at Samhällssäkerhet to discover how Secure Print can protect your organization.

COUNTERSIGN
Countersign by link22 ensures that no critical files or transactions are exported without dual control, strengthening protection against errors and unauthorized actions. By requiring multiple digital signatures for each transaction, a secure approval process is established, ensuring that at least two individuals must authorize an export before it is executed. Benefits of Countersign • Increased security – No single user can approve a file transfer independently. • Traceability and logging – Complete history of all approved transactions. • Protection against errors and unauthorized modifications – Ensures that files are reviewed by at least two individuals. • Integration with Data Guard and Cross Domain Solutions – Seamless adaptation to existing security processes. How Countersign Works 1. Request – A user requests approval for file export. 2. Review – One or more authorized reviewers verify the content. 3. Signing – At least two individuals digitally sign to approve the export. 4. Export – The file is approved and securely transferred out of the system. With Countersign, organizations can ensure that no sensitive files are exported without proper review, guaranteeing traceability, transparency, and enhanced security. Visit us at Samhällssäkerhet to discover how Countersign can strengthen your cybersecurity.

USB SCAN SOLUTION
USB Scan Solution by link22 is a security solution designed to inspect and sanitize USB devices before they are used in sensitive IT environments. The product is built to prevent the spread of malware and unauthorized files, reducing the risk of cyber threats and data breaches. By scanning, filtering, and validating the content, it ensures that only approved and verified files are allowed into the network. Benefits of USB Scan Solution • Protection against malware – Identifies and blocks viruses, malware, and unauthorized files. • Advanced filtering – Ensures that only approved file types can access the network. • Flexible installation – Can be adapted to an organization’s security policies and requirements. How USB Scan Solution Works 1. Connection – The USB device is connected to the secure scanning station. 2. Scanning – Files are inspected by multiple antivirus engines and customized security filters. 3. Filtering and validation – Unauthorized files are blocked or placed in quarantine for manual review. 4. Approved transfer – Only verified files are allowed into the network. With USB Scan Solution, organizations can ensure that USB devices do not pose a security risk, enabling controlled and secure data import. Visit us at Samhällssäkerhet to discover how USB Scan Solution can protect your organization.