Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Risk of attacks by hackers
Risk of data loss or damage
Values
Ensure Security and Business Continuity
Manage Risks
Tresys XD Air
XD Air™ is the only U.S. Cyber Command-approved tool for the transfer of classified data using portable media.
About Product
Description
XD Air is an integrated hardware/software package that inspects and cleans files on portable media of malware and other malicious content. A laptop-based kiosk, XD Air was developed in conjunction with the National Security Agency as a file sanitization tool to enable the safe use of portable media. In the six years since its development, more than 1,000 XD Air systems have been successfully deployed in government, nuclear, and commercial environments.
Application Flexibility Proven in a variety of government and critical infrastructure applications, XD Air:
How It Works
Application Flexibility Proven in a variety of government and critical infrastructure applications, XD Air:
- Protects against media-borne and data-borne threats when transferring data to secure or critical networks.
- Enables assured transfer of classified data between high-risk networks using portable media (meets the requirements of JTF-GNO CTO-10-004A for Removable Flash Media Device Implementation).
- Assists in publishing digital documents by exposing hidden content and verifying cleansing before release—helping ensure that classified or confidential data is not inadvertently disseminated.
- Verifies the authenticity of content from trusted sources.
How It Works
- Inspects and cleans files on removable media to mitigate the risk of introducing malicious content
- Offers three methods of protection: Known Good, Known Bad and Known Source
- Applies advanced filtering techniques to perform deep content inspection of complex file types, exposing hidden threats and data missed by conventional antivirus and anti-malware protection
- XD Air is hardened against attacks from media-borne malware
- Securely erases media
Competitive products
User features
Roles of Interested Employees
Chief Information Officer
Chief Technical Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
Certification requirements for products in country
Сonfidential data
Personal data operation