445 results found
    1. COUNTERSIGN

      COUNTERSIGN

      Countersign by link22 ensures that no critical files or transactions are exported without dual control, strengthening protection against errors and unauthorized actions. By requiring multiple digital signatures for each transaction, a secure approval process is established, ensuring that at least two individuals must authorize an export before it is executed. Benefits of Countersign • Increased security – No single user can approve a file transfer independently. • Traceability and logging – Complete history of all approved transactions. • Protection against errors and unauthorized modifications – Ensures that files are reviewed by at least two individuals. • Integration with Data Guard and Cross Domain Solutions – Seamless adaptation to existing security processes. How Countersign Works 1. Request – A user requests approval for file export. 2. Review – One or more authorized reviewers verify the content. 3. Signing – At least two individuals digitally sign to approve the export. 4. Export – The file is approved and securely transferred out of the system. With Countersign, organizations can ensure that no sensitive files are exported without proper review, guaranteeing traceability, transparency, and enhanced security. Visit us at Samhällssäkerhet to discover how Countersign can strengthen your cybersecurity.

    2. Course: Staff methodology, basics

      Course: Staff methodology, basics

      To handle a situation characterized by time pressure and unclear conditions, an organization needs to have the ability to act quickly, coordinated and correctly. A crisis situation, or social disruption, places great demands on you and your employees and you must have the ability to quickly move from the relatively well-ordered work situation of everyday life to unknown situations with quick and difficult decisions. This course aims to develop your ability to lead and coordinate crisis management work.

    3. Create independence from digital suppliers

      Create independence from digital suppliers

      All businesses have different requirements for their digital infrastructure. With Stokab's open dark fiber network, the network can be designed entirely based on the organization's needs - regardless of whether the focus is on high availability, geographical separation, future scalability or collaboration with multiple suppliers. Thanks to the network's scope and structure, there is great freedom to choose routes, nodes and connections. For example, we have over 23,000 access points in Stockholm. We are happy to help organizations in the work of designing a network structure that creates the best possible conditions for secure and robust communication. Regardless of the later choice of technology and services, fiber is the foundation of the network design - now and in the future. Once the network design is in place, the organization can choose how the connection and operation will take place - either in-house or via procured operators and suppliers, for example through the Swedish Agency for Administrative and Financial Affairs' framework agreement. This provides flexibility, long-term planning and the opportunity to adapt the solution over time, without being locked into a single actor. Contact us and we will help you develop a network solution tailored to your needs - completely free of charge. Email us: kundansvarig@stokab.se Or find our contact persons, see link below:

    4. Cross Domain Solutions

      Cross Domain Solutions

      Cross Domain Solutions by link22 enable secure and controlled data transfer between networks with different security classifications. Our solutions are used by government agencies, defense, and critical infrastructure to protect sensitive information and ensure regulatory-compliant data management. Benefits of Cross Domain Solutions Secure and regulated data transfer between protected networks Hardware-based isolation for maximum security Advanced filtering and validation of data Regulatory compliance – Well documented solutions to ease the burden of compliance related work Flexible integration – Easily adapts to existing IT environments Products in Cross Domain Solutions Data Diodes – Ensures one-way data flow, eliminating the risk of cyber intrusion. Data Guard – Controlled file transfer with advanced threat detection. Impex – Secure data import and export via offline media. Secure Print – Protected printing solution for sensitive documents. Countersign – Digital signing and review of documents in secure environments. Cross Domain Solutions ensure that only approved data is transferred while protecting against unauthorized access and malware. Visit us at Samhällssäkerhet to discover how our solutions can protect your organization!

    5. CyberResilient

      CyberResilient

      Cybersecurity Maturity Assessment. Quickly and easily assess your alignment with the core security requirements of the NIS2 Directive using our AI-powered online tool. Receive a comprehensive report outlining your current state, key observations, and recommended actions in both the short and long term. This project was developed with support from NCC-SE and MSB (Sweden’s National Coordination Centre for Research and Innovation in Cybersecurity and The Swedish Civil Contingencies Agency).

    6. Cybersecurity Team as a Service

      Cybersecurity Team as a Service

      Cybersecurity Team as a Service – a complete cybersecurity team for your organization Cybersecurity Team as a Service (CSTaaS) gives you access to a cross-functional cybersecurity team with the expertise you need, when you need it. The service is an effective alternative for organizations that lack internal resources or need additional support during periods of high workload, projects, audits, or assignments related to NIS2 and the Cybersecurity Act. The team can support both operational and strategic work and covers everything from risk management and technical analyses to policy development, incident management, and follow-up. Through CSTaaS, you gain a flexible, scalable, and cost-effective way to build a robust cybersecurity capability without having to recruit a full internal team.

    7. DATA GUARD

      DATA GUARD

      Data Guard by link22 is a software solution for secure file import and export, protecting IT systems from malware and unauthorized files. Through advanced scanning, filtering, and access control, Data Guard ensures that only approved and verified files are allowed to pass. Benefits of Data Guard • Secure import of files and software updates – Prevents malware from entering the network. • Advanced filtering – Identifies and blocks unwanted files based on configurable rules. • Support for antivirus and CDR – Enables the use of multiple antivirus engines and deep inspection. • Traceability and logging – Full transparency on who imports and exports files. Features of Data Guard • PKI support – Smart card authentication and transport protection using user certificates. • Inspection of confidential data – Secure file handling between security domains. • Support for countersigning – Requires approval from multiple users for exporting sensitive files. • Integration with data diodes – Added security through one-way data transfer. • Flexible installation – Can be deployed on Windows and RHEL, both physically and virtually. With Data Guard, organizations can minimize cyber threats and ensure controlled file import and export according to high security standards. Visit us at Samhällssäkerhet to discover how Data Guard can protect your organization.

    8. DEEP INSPECTION (CDR)

      DEEP INSPECTION (CDR)

      Content Disarm and Reconstruction (CDR) by Glasswall provides proactive protection against unknown cyber threats and zero-day attacks. By inspecting, cleansing, reconstructing, and delivering files, CDR ensures that only secure files can be imported and exported within your organization. Benefits of Deep Inspection (CDR) • Eliminates hidden threats – Neutralizes malicious code in files without affecting content. • Protection against zero-day attacks – Stops unknown threats that traditional solutions cannot detect. • Automated file reconstruction – Creates a secure version of each file according to standardized formats. • Perfect for Cross Domain Solutions – Seamless integration with link22’s products for secure file management. • Works for both import and export – Protects information moving between security domains. How CDR Works – Four Steps 1. Inspect – The file’s digital structure is validated against the manufacturer’s specifications. Deviations are handled immediately. 2. Cleanse – Risky elements such as macros and embedded links are removed according to organizational policies. 3. Reconstruct – The file is rebuilt according to the manufacturer’s standard for a harmless file type. 4. Deliver – The user receives a secure, verified, and standardized file free from hidden threats. With Deep Inspection (CDR), organizations can proactively eliminate cyber threats and ensure that only safe files are used in their operations. Visit us at Samhällssäkerhet to discover how CDR can protect your organization.

    9. Deployable solution - QuickLink

      Deployable solution - QuickLink

      Hexatronic QuickLink is designed for use in demanding environments where a fast connection is essential. The QuickLink is equipped with our rugged military-grade cable, which is an incredibly durable cable that can be used in much harsher environments than conventional fiber cable. The cable can withstand being placed directly on the ground in demanding environments and can be hung between trees to keep out of the way. Areas of application: - Access points - Audio / video systems - Emergency fiber - Mobile production trucks - Outdoor Broadcast - Temporary communication links Hexatronic QuickLink is a solution for distributing a temporary signal on site or bypassing a defective cable. QuickLink can be configured to fit your interface and is built for use in the field. Flexible design with configurable length, drum size, connector interface and fiber count. Safe fiber handling with protective sleeve and robust fiber cable. Configuration with robust fiber optic connectors available on request. - Robust fiber optic cable MIL-TAC - Reinforced fiber ends with mechanical protection - Easy-to-use puller with a durable pull loop - Lightweight cable reel The connection interface is configurable at both ends. Choose between standard LC, SC and ST connectors, as well as with an adapter plate or fanout at the inner end.