The Gate scanner Concept

As threats mutate and develop, defensive systems must continuously adapt to neutralize them. Gate Scanner, which is continuously updated, was originally developed for Kibbutz Sasa’s world leading armour and survivability integrator, Plasan.  Our system is designed to detect and eliminate cyber-attacks, online espionage and other forms of digital criminal activity.
Read More…

Gate Scanner blocks, scans and cleans all files and ensures that data is exchanged within the network in a controlled and secure way.  It uses a combination of six anti-virus programmes, mathematical processes which ‘bleach’ or ‘whiten’ the data, convert files, remove macros and other embedded elements, and deep scan archival material. Encryption and verification systems allow managers to monitor and verify all activity.

icon

GATE SCANNER
STANDARD KIOSK EDITION
Read More…

News & Events

IT-SA Conference 2016

Join us at the annual conference

for IT Security Expo and Congress.

Exhibition Centre Nuremberg, Germany.

October 18-20th, 2016

See more at:

http://https://www.it-sa.de/en/#sthash.rXu5GR7r.dpuf

Israel HLS & Cyber Conference 2016

Come and meet us at the 4th international HLS & Cyber conference

Find us at booth C72.

Israel trade & fairs Center, Tel Aviv.

November 14-17, 2016

See more at:
https://www.israelhlscyber.com/

Marketing Segments

Finance

Securing and protecting clients’ personal financial information.
Securing and protecting daily financial activities.
Securing and protecting the operational systems of financial organizations.

Defense

Securing and protecting confidential information and files.
Securing and protecting defense organizations, military compounds and war materiel from hostile takeover.
Securing and protecting operational systems related to defense and military activities.

Government

Securing and protecting confidential government information and files .
Securing and protecting citizens’ confidential information and files .
Securing and protecting systems operated by the government.

Critical Infrastructure

Securing and protecting operating systems of critical infrastructure from hostile takeover and environmental damage.
Securing and protecting operational systems from shutdowns.
Securing and protecting the customer databases and personal information.

Health

Securing and protecting patients’ healthcare information.
Securing and protecting daily healthcare activities.
Securing and protecting operational systems from shutdowns.

Industry

Securing and protecting operational systems operated by industrial organizations.
Securing and protecting IP, knowhow and contracts of industrial organizations.
Securing and protecting the personal information and contracts of employees.