
Sectra End-to-end encryption – E2EE for TETRA users
The Sectra E2EE is a smart card-based encryption solution for terminals in a TETRA network, completely hassle-free for the user. It can be used transparently with various TETRA terminals and end-to-end encryption ensures that information only reaches the intended party. Designed to comply with the requirements for communicating at the RESTRICTED level, it is the perfect choice for emergency cooperation organizations such as the police, coast guard, customs and national rescue service agencies.

Sectra Remote Connect for Windows
Sectra Remote Connect for Windows delivers trusted and seamless remote access to classified and sensitive information—with the same protection, performance and ease of use as working in a secure office. Purpose-built for civil authorities, defense organizations and public sector entities, it ensures always-on connectivity, intuitive user experience, and full organizational control—without requiring additional hardware or complex authentication from the user.

Sectra Stealth Connect – A chameleon in mobile networks
Stay secure on any network. Sectra Stealth Connect is a powerful security gateway that protects your devices in risky environments. Acting as a robust network bridge and firewall, it connects your phone, tablet, or laptop to your home network or services while protects the user from network-related threats and ensures that the user is hard to detect and follow. Sectra Stealth Connect is a discreet and portable mobile device that ensures a secure and undetectable online presence in risky network environments. With a simple touchscreen interface, it acts as a secure mobile hotspot for your devices.

Sectra Tiger/E Managed Service
Sectra Tiger/E Managed Service is a sovereign, fully managed collaboration platform designed to meet the evolving needs of authorities, municipalities, critical entities, and corporations. It is purpose-built to give you flexibility and mobility—whether you are handling business secrets or sensitive daily communication, or operating in time-critical situations such as a crisis. The platform enables secure, scalable communication and supports encrypted calls, video and chat in environments that are sensitive but unclassified.

Sectra Tiger/S — Secure communication up to SECRET
Sectra Tiger/S is a quantum-resilient communication system that allows you to share classified information up to and including the classification level SECRET — through encrypted speech, messaging or data transfer. Sectra Tiger/S has been designed to guarantee availability anywhere, anytime—in an office environment, in the city or out in the field, onboard a vessel or in a bunker. It offers the flexibility to connect through fixed or mobile networks and is available in two different versions, as a mobile or as a stationary phone. For mission-based operations, stable communication links are provided between mission and headquarters using secure interfaces to satellite communication. Unique interoperability features allow Sectra Tiger/S 7401 to enable secure communication across nations and organizations and between security levels while ensuring the integrity of each security domain.

SECURE ACCESS CLIENT
Secure Access Client by link22 provides secure and controlled connections to sensitive systems and networks. With strong authentication, encrypted communication, and role-based access control, the solution ensures that only authorized users gain access to critical IT environments. Benefits of Secure Access Client Secure remote access – Protects sensitive systems from unauthorized entry. Strong authentication – Supports smart cards, certificates, and multi-factor authentication. Encrypted communication – Secures all traffic between the client and the protected network. Role-based access control – Users can only access approved resources. Regulatory compliance – Delivered with comprehensive documentation to simplify oversight processes. Technical Features Isolated client – Prevents exposure of sensitive information on unsecured devices. Secure VPN connection – End-to-end encryption of all network traffic. No local data storage – Eliminates the risk of data leakage if a device is lost or compromised. With Secure Access Client, organizations can ensure secure and controlled remote access, enabling flexible and protected remote work without compromising IT security. Visit us at Samhällssäkerhet to see how our solution can protect your organization!

Secure operation for critical systems
A robust fiber network is built not only for today's needs, but also to function under future stresses. Stokab's long-term and stable ownership means that the network is always built with preparedness, scalability and endurance in focus. Stokab's network is built with standardized material choices and ducting that enable future expansion of fiber. This creates flexibility over time and makes it possible to strengthen or adapt the network without having to rebuild from scratch. The high degree of documentation in the network means that connections can be quickly analyzed, verified and, if necessary, rerouted. In the event of an interruption or disruption, there are conditions to quickly identify the impact and create alternative routes for communication - a crucial ability for socially critical operations and a central part of the work with risk management and incident preparedness according to NIS2. The operational reliability of Stokab's fiber network is further strengthened through, for example, high inventory, backup power and access to mobile reserve nodes for crisis establishment. We have a local operations organization with in-depth knowledge of the network's structure, which ensures rapid restoration and continuous availability, even during high-alert situations.

SECURE PRINT
Secure Print by link22 ensures that only authorized users can print sensitive documents, protecting information from unauthorized access and leaks. Through secure authentication, logging, and traceability, the printing process becomes fully controlled and tailored for organizations with high-security requirements. Benefits of Secure Print • Protection against information leaks – Only authorized users can print sensitive documents. • Secure authentication – Supports smart cards and certificates for printing. • Traceability and logging – Complete history of all print jobs. • Integration with security domains – Secure printing in protected environments. • Flexible installation – Compatible with existing printers and systems. How Secure Print Works 1. Authentication – The user identifies themselves via a smart card or another secure method. 2. Verification – The system ensures that only authorized users can print. 3. Printing – The document is printed in a secure and protected environment. 4. Logging – The print job is recorded for traceability and compliance with security policies. With Secure Print, organizations can guarantee the secure printing of sensitive documents and prevent information leaks. Visit us at Samhällssäkerhet to discover how Secure Print can protect your organization.

Secure shipping container (M/25)
Protect your valuable assets during transport and storage. Mobile Strongroom M/25 is a customized safety container which offers a unique and safe transport solution for firearms, ammunition and other classified valuables.

Secure video conference
Skiffer is a secure video conferencing service designed for handling sensitive information. Organizations that handle sensitive information must be able to operate efficiently without risking that their data or personal information falls into the wrong hands. For this reason, Tutus has developed a video communication service with enhanced security. The solution is designed to support organizations with specific requirements for handling sensitive information in their video conferences. Skiffer has been reviewed and approved by a Swedish authority for the protection of sensitive information. - All data stored in Sweden, in a secure data center within a protected facility - Development and operations handled by security-cleared Tutus personnel - No software installation required – works directly in the browser - Strong authentication with approved e-identifications - Lobby feature, breakout rooms, screen sharing, and recurring meeting functionality - App available for both Android and iPhone

Security Clearance manager
Manage security clearances without hassle With Security Clearance Manager you can collect registry checks, security clearance interviews and security protection agreements in one system. It facilitates management, follow-up and traceability so that you can focus on your core business. At the same time, it offers a modern, user-friendly and powerful reporting tool. The system is designed with security as a fundamental component and applies the guidelines recommended by the Swedish Security Service for secure digital transmission of information.

Security Protection
Security protection is about protecting the information and activities that are important for Sweden's security. With experienced staff in the field, 4C Strategies can support you throughout the entire security protection process, regardless of whether you are an organization that has recently identified that you may be covered by the legislation or if you are an organization that has worked on these issues for a long time. We support municipalities, regions, government agencies and socially important companies with the following services in the security protection area: - Conducting operational and security protection analysis - Developing a security protection plan - Conducting security screening interviews - Training in security protection - Strategic advice in security protection.

Security protection

Security solutions for critical infrastructure
Sectra is a leading security service provider of managed detection and response services (MDR) for critical security in energy, water supply and the process industry. We provide managed detection and response in close cooperation with our customers, adapted to their needs and resources Modern society depends on operations in critical infrastructure being conducted securely and reliably; interruptions to operations can result in significant disruptions, giving rise to major financial and societal consequences.

SEK® | IT system for security-classified information
SEK® is a standalone IT platform for handling security-classified information up to the level Swedish Secret. The system consists of a TEMPEST-protected standalone computer based on the Panasonic Toughbook FZ-55, hardened software, as well as documentation and process support for accreditation in accordance with the Security Protection Act. The platform complies with RÖS U1 and Tempest Level A and can be configured for networked operation if required. Comex Electronics AB is a Panasonic Premium Partner.
445 results found