SignalGuard™

SignalGuard™ Provides Endpoint Protection
EXTEND
THE NETWORK
SECURE
CLASSIFIED DATA
MONITOR
ENDPOINTS
SignalGuard™ is a unified hardware and software solution designed to extend classified networks in a way that is secure, fully compliant and yet, easy to use for both the user and administrators.
Combining security and productivity
- Provides authenticated users with convenient secure network access
- Eases the burden of device maintenance
- Significantly reduces the risk of a data breach
CyberSecure IPS™ hardware provides physical fiber monitoring, data shut-off and a significant risk reduction of unauthorized access to secure devices or data breaches. IMS™ (Infrastructure Management System) software provides the administrative intelligence—managing the request, approval, and automated logging required for full regulatory compliance.
Solution Benefits
SignalGuard™ offers multiple benefits over typical solutions such as encryption only, armored fiber and checking in/out devices.
Reduce Risk of Data Breach
SignalGuard™ only transmits KVM inputs (Keyboard, Video and Mouse) through fiber which is also managed for intrusion detection.
Continuous Operations and Maintenance
SignalGuard™ ensures that devices are online for patches and updates so the end user can more productive.
Seamless Access & Auditing
SignalGuard™ uses Active Directory for access request and automatically generates detailed user access logs for a clear audit trail of who accessed which workstation and when.
Proactive Threat Response
SignalGuard™ can automatically shut off data transmission after approved usage times have expired, identify suspicious usage times and enable after-hours alarms.

How SignalGuard™ Solves Challenges
Securing the path from the server to the desktop requires more than just encryption. Explore how SignalGuard™ addresses the four most common security challenges in fiber-extended networks with proactive, physical-layer solutions.
Challenge 01
Removing user compute devices from a secure enclosure significantly increases the risk of a classified data breach.
The Solution
SignalGuard™ extends secure network access while eliminating the need for the device to leave a secure enclosure in the first place.
Challenge 02
Storing compute devices in secure enclosures delays updates and patching, forcing users to wait for updates before they can work.
The Solution
SignalGuard™ ensures that compute devices maintain constant network connections so it is up to date and ready for work.
Challenge 03
Protecting classified data transmission from a secure enclosure to the user workstation by monitoring infrastructure for physical intrusion.
The Solution
SignalGuard™ only transmits keyboard, video and mouse input data from the device to the user end-point. Additionally, KVM infrastructure is monitored by Opti-Guard™ for physical intrusions.
Challenge 04
Maintaining a record of users, requested devices and usage times is is cumbersome and subject to error or neglect.
The Solution
CyberSecure IMS™ simplifies user access requests and approval, logs and forensics for audits and usage tracking as well as automatic features for streamlined operation.
How SignalGuard™ Works
SignalGuard™ is a turn-key solution that is made up of multiple hardware components and software add-on to our management software IMS™.

OPT-GUARD™
Our next-generation platform provides Flex-Port™ technology with real-time intrusion detection, precise event location, forensic visibility, and centralized alarm management for fiber pathways. Learn more about Opti-Guard™.
STOPLIGHT™
A remotely configurable fiber optic patch panel with physical shutters that when placed between KVM Extender Transmitter and Receiver devices, can physically disable or enable the data transmission. Learn more about StopLight™.
KVM EXTENSION
Utilization of a KVM extender from the secure source location allows the network to be extended to a number of destinations. KVM is essentially a remote control for the compute device without transfer of sensitive data.
SECURE PATHWAY
The secure pathway section of the solution can be any CNSSI 7003 approved carrier and the necessary detection equipment to establish a PDS that alarms the fiber between the source and destination.
ENDPOINT ENCLOSURE
Provides tamper security for the KVM extender receiver unit and is the connection point for peripherals. Optionally, the enclosure can use a sensor with open/close status, providing true end-to-end monitoring.
IMS™
The SignalGuard™ feature of IMS™ enables or disables KVM access to the endpoints but still maintains host network connectivity to the compute device for software patches and updates. Learn more about IMS™.
SignalGuard™ Access Request & Approval Workflow
SignalGuard™ makes the multi-stage process of authorizing access to a secure workstation simple for both user and administrators.
Explore the 8 stages that illustrate a typical user request and approval workflow below.
Frequently Asked Questions:
Does SignalGuard™ require any software installation on the user's computer?
No. The workstation only consists of keyboard, monitor and mouse. These input devices are remotely accessing the compute device where it resides in the secure enclosure. This device does not need any additional agents, drivers or software in order for SignalGuard™ to function.
Can SignalGuard™ be managed centrally alongside other CyberSecure IPS products?
Absolutely! SignalGuard™ integrates seamlessly with our Infrastructure Monitoring System™ (IMS) software. As part of a Protected Distribution System deployment, you can view the status of every workstation endpoint globally from a single dashboard, providing real-time situational awareness and automated alarm dispatching if fiber from the compute device to the endpoint is compromised.
Is SignalGuard™ compliant with CNSSI 7003 and PDS requirements?
Yes. SignalGuard™ is designed to help organizations meet and exceed CNSSI 7003 standards for Protected Distribution Systems (PDS). SignalGuard™ eliminates time-consuming, manual tracking of users, devices, usage dates and times and user by automatically logging every stage of the process. This level of detail ensures stress-free audits for NIPR, SIPR, and other classified networks.








