eC Guard

Secure Travel Companion

Hardware VPN with focus on the end-user experience A network can now securely extend over large geographical areas, from your home to your travel destination, and your next-door café. When connected through eC-Guard, your traffic is encrypted with state-of-art encryption and your endpoint has secured access to your internet services. You are protected from unauthorized access to your transferred data, and you hide the digital signature of your most private devices, such as your phone and your laptop.

Support 08:00 - 17:00

Smart Multitool

Compatible w. any Operative System

Best practice VPN encryption

Live monitoring

Reserv Power Bank

State-of-the-art encryption

Built-in Firewall

Swedish software

What is eC-Guard?

A network can now securely extend over large geographical areas, from your home to your travel destination, and your next-door café.

When connected through eC-Guard, your traffic is encrypted with state-of-art encryption and your endpoint has secured access to your internet services.

You are protected from unauthorized access to your transferred data, and you hide the digital signature of your most private devices, such as your phone and your laptop.

Examples of day-to-day services that become protected is email, VoIaP telephony, document sharing, remote desktop, data storage, and industrial remote control.

This is different from a software VPN, where authentication and encryption are performed by a client on the user’s computer and thereby increasing the attack surface against the company’s data and decreasing the anonymity of the user.

eC-Guard is not an account based service that is accessed via the ‘standard internet’. It is a stand-alone, portable, bespoke-ecrypted system. Available to use anywhere in the world with private, end-to-end safety guaranteed.

eC-Guard flow of protection:

UNCENSORED LOCATION

CENSORED DESTINATION

CENSORED DESTINATION

IF INDICATOR IS GREEN:
- eC-Guard is active
- Communicate freely

All private devices safe-guarded via encrypted tunnel, providing uncensored communications.

- VOIP
- WIFI (HOT SPOTS)
- BATTERY / POWER PACK

- LIVE STREAM BROADCAST
- MULTIDEVICE CONNECTIVITY

UNCENSORED LOCATION

What can the eC Guard prevent?

Regular Software VPNs can’t guarantee that your IP and traffic is encrypted since they don’t have authority over your system. The eC-guard bypasses this.

Why use eC-Guard if you already have software-VPN?

  • Even better security with layer upon layer principle
  • eC-Guard built in firewall for enhanced protection
  • Always working VPN avoid software conflicts e.g. major operating system updates

Software vs Hardware

A hardware VPN is by design more tamper proof due to its propose built operating system. Regular software updates and/or malicious actors can disrupt your software VPN that you have on your ordinary computer, tablet or phone.

It is also important to know that your computer is still accessible from the local network even though you have a software VPN active. A hardware VPN becomes your hardware firewall the same time. It is less likely that an attacker gains control of your hardware VPN than your computer.

Example, an attacker has gained control of your home router and has the same level of access to your local network as you have.

The attacker can communicate with your computer and scan for services and open ports on your computer that gives access to your PC. This way the attacker can access your corporate data through your software VPN tunnel.

Many systems today are insecure by design. These systems often lack the ability to install software VPN. OT-Devices for example. eC-Guard hardware VPN protects your OT devices as well where software VPN is not possible. In addition, some of eC-Guard hardware have built in mobile connectivity so that you get a secure mobile connectivity hotspot.

IT/OT protection

  • Grant access to your Cameras
  • Network connected thermostat
  • Restrict who is using the company printer
  • Prolong life of outdated, end of life products with eC-Guard in front.

Key points of communicating via hardware VPN

  • Mask your digital fingerprints from your devices with eC
  • Guard in the front. – Built in firewall for enhanced protection.
  • Using hardware for authentication and encryption processes instead of software reduces the attack surface against the company’s data.
  • Protection while connected to an unknown open Wi-Fi systems a common hunting grounds for hackers, who can place themselves between you and the router and intercept all your data.
  • Provide VPN solution for IoT devices and other networks where software VPN is not available.
  • Our eC-Guard encrypts all data that you send over the network and provides a much deeper level of security than normal use of the internet or via a software VPN.

Comparing VPN services with eC-Guard

Normal connection

Digital footprints are revealed

eC Guard

Hide your digital footprints

Prometheus and Grafana implemention

By integrating with Prometheus and Grafana, we can enhance your ability to collect statistical data for future decision-making and life cycle analysis.

Prometheus is a powerful monitoring and alerting toolkit that allows you to gather and store time-series data related to the performance and health of your systems. Grafana complements Prometheus by providing a robust visualization platform, enabling you to create interactive and informative dashboards. grafpana.

Cisco Umbrella, enhance the protection of your assets

Cisco Umbrella is a powerful cybersecurity tool, and its integration with eC-Guard can enhance the protection of your assets. You have the flexibility to monitor it independently or integrate it seamlessly into your eCiceron’s Strategic Awareness Cell, a MDR service with highly skilled personnel.

By combining Cisco Umbrella and eC-Guard, you can strengthen your organization’s security posture, safeguarding your digital assets from threats such as malware, phishing attacks, and malicious websites. This integration provides you with the capability to actively monitor and respond to security events, ensuring the safety and integrity of your network and data.

Inhouse developed User Interface for optimized experience and usability

Cisco Umbrella is a powerful cybersecurity tool, and its integration with eC-Guard can enhance the protection of your assets. You have the flexibility to monitor it independently or integrate it seamlessly into your eCiceron’s Strategic Awareness Cell, a MDR service with highly skilled personnel.

By combining Cisco Umbrella and eC-Guard, you can strengthen your organization’s security posture, safeguarding your digital assets from threats such as malware, phishing attacks, and malicious websites. This integration provides you with the capability to actively monitor and respond to security events, ensuring the safety and integrity of your network and data.

Technical specifications

Hardware

The hardware specifications listed below represent one of our most popular end-user devices. This hardware is well-suited for the busy remote worker due to its extended battery life and integrated LTE modem, providing reliable connectivity on the go.

Hardware Spec
CPUQCA9531, 650 MHz SoC
RAMDDR2 128 MB
Storage16 MB NOR + 128 MB NAND
SIM typeNano SIM card
Ethernet1 Gbit
Speed300 Mbit/s Wi-Fi speed
SD memory512 GB Max MicroSD
BatteryBuilt-in 5000 mAh
Dimensions120x74x28mm
Weight223.5 g

Operating System

We compile the eC-Guard platform from source code on Linux, allowing us to maintain hardware agnosticism. This flexibility enables us to tailor our code to the specific hardware preferences of our customers.

For those who prefer to use Swedish-made hardware, we wholeheartedly embrace this choice and adapt our Linux kernel to ensure compatibility and optimal performance on that hardware.

Our commitment to hardware agnosticism and customization ensures that our solution can seamlessly integrate with a wide range of hardware configurations to meet the unique needs of our clients.

Cryptography

eCiceron is part of a Swedish initiative called the Cybernode, the aim of which is to accelerate innovation and research within the cybersecurity field. Within the Cybernode, eCiceron participate in the working group for cryptography. One of the primary responsibilities of this group is to monitor and share insights related to developments and resources within the global cryptography landscape.

With the insights provided by this group, we continually strive to implement current cryptographic solutions with best practices at all times. In the event that security experts in the field recommend changes or updates to our security approach, we promptly adjust our implementations to align with these recommendations.

Our commitment to staying up-to-date and adapting to evolving security standards is paramount in maintaining the highest level of data protection and integrity.

We welcome all inquiries related to cryptographic solutions to meet your requirements and challenge ourselves to deliver the best possible solutions. Your satisfaction is our priority, and we are committed to addressing your cryptographic needs effectively. Please don’t hesitate to reach out with any questions or specific challenges you may have, and our team will be eager to assist you.

ENCRYPTION
ChaCha20 for symmetric encryption
Curve25519 for ECDH
BLAKE2s for hashing and keyed hashing
SipHash24 for hashtable keys
HKDF for key derivation

eC Guard Security Levels

One configuration of eC-Guard can provide all of the different Security levels at the same time. You can have equipment with different purpose and use your own routines with eC-Guard to meet up the level you need for that device.

Very HIGH Security

Air Gapped Work

eC-Guard information synchronization via USB sharing

HIGH Security

Cable Connected

eC-Guard cable connected to End Device

Normal Security

Wi-Fi connected (SSID/PSW rotation)

eC-Guard Wi-Fi connected with strong password WPA3

Why choose us?

In our business, earning your trust is paramount, and we place a high emphasis on respecting your personal integrity. Rooted in a Nordic heritage, our profile is shaped by the disciplined and secure ethos of the Swedish Armed Forces. This background underpins our commitment to go above and beyond in delivering our services, ensuring the safeguarding of your interests at all times.