Description
Palm size and cost effective, cybersecurity appliance for
IOT
IIOT
Work from anywhere employees
Mobile BitNetSentry (mBNS), Remote Station.
Basic configuration includes:
Palm size and cost effective, cybersecurity appliance for
IOT
IIOT
Work from anywhere employees
Weight | 350 g |
---|---|
Dimensions | 84 × 112 × 35 mm |
Model Name 1 | mBNS for Remote Office (RMT) |
Part Number 1 | ES3000-mBNS-RMT-01P-SNBDX-WX |
Description 1 | mBNS, for secure remote communication with office |
Model Name 2 | mBNS IoT (IOT) |
Part Number 2 | ES3000-mBNS-IOT-01P-SNBDX-WX |
Description 2 | mBNS, for IIOT, medical IoT etc. |
SW version | ES00X.2.1.2x |
PP (Pairs of Lan Ports) | 1 |
Max number of EP (End Points), e.g. PC, laptop, server, IoT device, supported by the BNS | 1 |
Max number of VC (Virtual Channels) | Up to 8 |
Ethernet Ports | 2 x 1GbE RJ45 (Total 2 ports) |
Advanced Encryption Standard (AES) | Encryption data traffic per selected channel/s according to AES 256 bit |
Input Voltage | 5W-15W, Input Up to DC 9V – 36V (When ordered with extended input |
Operating Temperature | 0°C to 45°C (Optional -40°C to +85°C) |
Relative Humidity | 5% – 95% non-condensing |
MTBF | > 500,000 hours |
Cooling | Passive Cooling Fanless Design |
Warranty | 1 years (optional 10 years in total) |
Certifications (Emissions/Immunity) | With FCC 47CFR part 15: 2017, subpart B,Class B |
EN, IEC | With EN 60950-1:2006+A11:2009+A1:2010+A12:2011+A2:2013; |
ISO/IEC 15408 | Common Criteria (CC) for Information Technology Security Evaluation – ISO/IEC 15408, EALs 1-7 compliance |
UL | UL Listed for USA and Canada E510538 |
Power Supply for mBNS | UL 62368-1 and CAN/CSA C22.2 No. 62368-1-14, |
Lead Time (Max) | 14 weeks |
Status | New release, orders available |
Securely access to your employees who work remotely, while keep your organization safe even in case VPN’s password became available to the hacker.
Migration of the “weakest” link in security chain which is the Human Element. With the rise of mobile workforces and the cloud, the traditional networking model can no longer be trusted. Current practice is to use VPN which is insufficient because these tools become useless once the hacker gains access to the password or encryption keys.
Protect any expensive or critical IoT device from zero-day and other malicious attacks.
mBNS allows only legal access to the device excluding any attempts of an unauthorized access. mBNS’s invisibility in the network makes your device unreachable for any malicious attack.