eC Guard
Secure Travel Companion
What is eC-Guard?
A network can now securely extend over large geographical areas, from your home to your travel destination, and your next-door café.
When connected through eC-Guard, your traffic is encrypted with state-of-art encryption and your endpoint has secured access to your internet services.
You are protected from unauthorized access to your transferred data, and you hide the digital signature of your most private devices, such as your phone and your laptop.
Examples of day-to-day services that become protected is email, VoIaP telephony, document sharing, remote desktop, data storage, and industrial remote control.
This is different from a software VPN, where authentication and encryption are performed by a client on the user’s computer and thereby increasing the attack surface against the company’s data and decreasing the anonymity of the user.
eC-Guard is not an account based service that is accessed via the ‘standard internet’. It is a stand-alone, portable, bespoke-ecrypted system. Available to use anywhere in the world with private, end-to-end safety guaranteed.
eC-Guard flow of protection:
UNCENSORED LOCATION
CENSORED DESTINATION
CENSORED DESTINATION
IF INDICATOR IS GREEN:
- eC-Guard is active
- Communicate freely
All private devices safe-guarded via encrypted tunnel, providing uncensored communications.
- VOIP
- WIFI (HOT SPOTS)
- BATTERY / POWER PACK
- LIVE STREAM BROADCAST
- MULTIDEVICE CONNECTIVITY
UNCENSORED LOCATION
Your business needs eC-Guard if:
- Your employees handle what is considered personal data according to the GDPR.
- You are concerned about eavesdropping from Companies/Competitors, National Agencies, or other malicious actors.
- You need secure mobile connectivity.
- Your employees often use open networks for work.
What can the eC Guard prevent?
Regular Software VPNs can’t guarantee that your IP and traffic is encrypted since they don’t have authority over your system. The eC-guard bypasses this.
Why use eC-Guard if you already have software-VPN?
- Even better security with layer upon layer principle
- eC-Guard built in firewall for enhanced protection
- Always working VPN avoid software conflicts e.g. major operating system updates
Software vs Hardware
A hardware VPN is by design more tamper proof due to its propose built operating system. Regular software updates and/or malicious actors can disrupt your software VPN that you have on your ordinary computer, tablet or phone.
It is also important to know that your computer is still accessible from the local network even though you have a software VPN active. A hardware VPN becomes your hardware firewall the same time. It is less likely that an attacker gains control of your hardware VPN than your computer.
Example, an attacker has gained control of your home router and has the same level of access to your local network as you have.
The attacker can communicate with your computer and scan for services and open ports on your computer that gives access to your PC. This way the attacker can access your corporate data through your software VPN tunnel.
Many systems today are insecure by design. These systems often lack the ability to install software VPN. OT-Devices for example. eC-Guard hardware VPN protects your OT devices as well where software VPN is not possible. In addition, some of eC-Guard hardware have built in mobile connectivity so that you get a secure mobile connectivity hotspot.
IT/OT protection
- Grant access to your Cameras
- Network connected thermostat
- Restrict who is using the company printer
- Prolong life of outdated, end of life products with eC-Guard in front.
Key points of communicating via hardware VPN
- Mask your digital fingerprints from your devices with eC
- Guard in the front. – Built in firewall for enhanced protection.
- Using hardware for authentication and encryption processes instead of software reduces the attack surface against the company’s data.
- Protection while connected to an unknown open Wi-Fi systems a common hunting grounds for hackers, who can place themselves between you and the router and intercept all your data.
- Provide VPN solution for IoT devices and other networks where software VPN is not available.
- Our eC-Guard encrypts all data that you send over the network and provides a much deeper level of security than normal use of the internet or via a software VPN.
Comparing VPN services with eC-Guard
Normal connection
Digital footprints are revealed
eC Guard
Hide your digital footprints
Prometheus and Grafana implemention
By integrating with Prometheus and Grafana, we can enhance your ability to collect statistical data for future decision-making and life cycle analysis.
Prometheus is a powerful monitoring and alerting toolkit that allows you to gather and store time-series data related to the performance and health of your systems. Grafana complements Prometheus by providing a robust visualization platform, enabling you to create interactive and informative dashboards. grafpana.
Cisco Umbrella, enhance the protection of your assets
Cisco Umbrella is a powerful cybersecurity tool, and its integration with eC-Guard can enhance the protection of your assets. You have the flexibility to monitor it independently or integrate it seamlessly into your eCiceron’s Strategic Awareness Cell, a MDR service with highly skilled personnel.
By combining Cisco Umbrella and eC-Guard, you can strengthen your organization’s security posture, safeguarding your digital assets from threats such as malware, phishing attacks, and malicious websites. This integration provides you with the capability to actively monitor and respond to security events, ensuring the safety and integrity of your network and data.
Inhouse developed User Interface for optimized experience and usability
Cisco Umbrella is a powerful cybersecurity tool, and its integration with eC-Guard can enhance the protection of your assets. You have the flexibility to monitor it independently or integrate it seamlessly into your eCiceron’s Strategic Awareness Cell, a MDR service with highly skilled personnel.
By combining Cisco Umbrella and eC-Guard, you can strengthen your organization’s security posture, safeguarding your digital assets from threats such as malware, phishing attacks, and malicious websites. This integration provides you with the capability to actively monitor and respond to security events, ensuring the safety and integrity of your network and data.
Technical specifications
Hardware
The hardware specifications listed below represent one of our most popular end-user devices. This hardware is well-suited for the busy remote worker due to its extended battery life and integrated LTE modem, providing reliable connectivity on the go.
Hardware Spec | |
---|---|
CPU | QCA9531, 650 MHz SoC |
RAM | DDR2 128 MB |
Storage | 16 MB NOR + 128 MB NAND |
SIM type | Nano SIM card |
Ethernet | 1 Gbit |
Speed | 300 Mbit/s Wi-Fi speed |
SD memory | 512 GB Max MicroSD |
Battery | Built-in 5000 mAh |
Dimensions | 120x74x28mm |
Weight | 223.5 g |
Operating System
We compile the eC-Guard platform from source code on Linux, allowing us to maintain hardware agnosticism. This flexibility enables us to tailor our code to the specific hardware preferences of our customers.
For those who prefer to use Swedish-made hardware, we wholeheartedly embrace this choice and adapt our Linux kernel to ensure compatibility and optimal performance on that hardware.
Our commitment to hardware agnosticism and customization ensures that our solution can seamlessly integrate with a wide range of hardware configurations to meet the unique needs of our clients.
Cryptography
eCiceron is part of a Swedish initiative called the Cybernode, the aim of which is to accelerate innovation and research within the cybersecurity field. Within the Cybernode, eCiceron participate in the working group for cryptography. One of the primary responsibilities of this group is to monitor and share insights related to developments and resources within the global cryptography landscape.
With the insights provided by this group, we continually strive to implement current cryptographic solutions with best practices at all times. In the event that security experts in the field recommend changes or updates to our security approach, we promptly adjust our implementations to align with these recommendations.
Our commitment to staying up-to-date and adapting to evolving security standards is paramount in maintaining the highest level of data protection and integrity.
We welcome all inquiries related to cryptographic solutions to meet your requirements and challenge ourselves to deliver the best possible solutions. Your satisfaction is our priority, and we are committed to addressing your cryptographic needs effectively. Please don’t hesitate to reach out with any questions or specific challenges you may have, and our team will be eager to assist you.
ENCRYPTION |
---|
ChaCha20 for symmetric encryption |
Curve25519 for ECDH |
BLAKE2s for hashing and keyed hashing |
SipHash24 for hashtable keys |
HKDF for key derivation |
eC Guard Security Levels
One configuration of eC-Guard can provide all of the different Security levels at the same time. You can have equipment with different purpose and use your own routines with eC-Guard to meet up the level you need for that device.
Very HIGH Security
Air Gapped Work
eC-Guard information synchronization via USB sharing
HIGH Security
Cable Connected
eC-Guard cable connected to End Device
Normal Security
Wi-Fi connected (SSID/PSW rotation)
eC-Guard Wi-Fi connected with strong password WPA3