Newest Listing

Top Rated

Most Popular

Data DiodesRSS

Add your listing here

Data Diode security products offer one-way communications, allowing secure transfers from a "low security" network to a "high security" network without allowing a path for information to travel back. The most common form of a data diode (unidirectional network) is a simple modified fiber optic cable, with send and receive transceivers removed for one direction. Most commercial products add other software functionality.

 

The benefit of this type of network connection is it allows networks with sensitive information stored to have access to the Internet as well. There are some drawbacks to this design, unless the vendor builds in software to overcome the drawbacks. TCP/IP communications that require acknowledgements can't flow successfully over a purely hardware data diode, and there is no way for the "low" network to ensure a successful data transfer occurred. Also, this does not prevent viruses or other malicious programs from travelling to the "high" network through the connection.

 

These products tend to focus on the defense and infrastructure environments where security is critical.

Visit the Product Site

The Nexor Data Diode is an EAL7+* evaluated solution to the information sharing problem by only allowing data transfers in one direction, guaranteeing that no data will leak back from the secure to the less secure network.

VendorNexor Limited
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

The GeNUGate data diode solution is made up of three series-connected security systems – an application level gateway, a packet filter, and a second application level gateway (A-P-A structure). These three components together act like a sluice, with a wid ...

VendorGeNUA
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

The Fox DataDiode helps you to prevent data leakage of classified information, using a one-way connection, while still having access to up-to-date unclassified data such as updates for Anti-Virus or Microsoft Windows. It also prevents unwanted acc ...

VendorFox-IT
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Owl Computing utilizes DualDiode® technology for hardware enforced confidentiality. Application proxies and device drivers further enforce the information assurance and reliability of the data diode transfer solution. Data integrity is enhanced by inte ...

VendorOwl Computing Technologies, Inc.
Pricing ModelCommercial
Modified
Vado One Way

Visit the Product Site

The VADO One Way is the most cost effective one way system. The system is based on 1Gbit fiber optic NICs.  The system is delivered in two ways: Option 1 fiber optic cards (TX+RX) + TX/RX agents + fiber optic cable (Single fiber) for installation on the ...

VendorVado One Way
Pricing ModelCommercial
Modified

Visit the Product Site

The Network Pump® is a Government off-the-shelf (GOTS) High Assurance “One-Way” Guard that enables applications operating on a lower security level network to pass information to applications on a higher security level network automatically.  Develop ...

VendorNaval Research Laboratory
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

The Interactive Link product suite is built on the principle of allowing organisations operating on classified or secure networks to retrieve and access data from less secure networks whilst providing absolute protection to the confidentiality of the c ...

VendorBAE Systems
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Waterfall’s™ Unidirectional Security Gateways and data diodes core is shared by all of its products and solutions. The Waterfall core, a unique non routable system, is coupled with software agents that mediate its integration into the surrounding envir ...

VendorWaterfall Security Solutions Ltd.
Pricing ModelCommercial
ModifiedNever
DeepSecure TransGap

Visit the Product Site

The TransGap Web application resides on both source and destination systems. TransGap maintains different user accounts on both source and destination systems that are independent of any operating system accounts. Typically, a user must login to the works ...

VendorDeepSecure
Pricing ModelCommercial
Modified