<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">


Securosys designs highest security communications technologies and systems for enterprise applications and manufactures them using a trusted, Swiss supply chain, truely "Swiss Made".

Where does your network security equipment come from? Who has access to it? Are there any backdoors? These are key question every IT organization needs to be able to answer without any doubts.

Secure data transmission has been technologically feasible for many years. Strong, standardized encryption algorithms exist that utilize large enough key sizes that render attacks impractical. Methods for authentication of data, users and entities exists for which no attacks are known. Even protocols are available where its security can be proven mathematically. Yet, we learn almost on a daily basis of stolen data, intercepted communications, and hacked websites.

The main reasons for these breaches are errors and bugs in hardware and software. Such flaws and vulnerabilities may occur unintentionally because software has become too voluminous and complex. It cannot be developed error-free any more, even with massive resources and enough time at hand. Most of the time such errors and bugs will not affect the system security and are weeded out over  time.

Unfortunately, there are also errors that have been designed into the system on purpose. Some manufacturers intending to sell their products abroad have been requested by their respective governments to install so-called backdoors into their equipment. The aim of these governments is at first glance a comprehensible one: Their intend is to prevent that a product, should it fall into wrong hands, to be used against their own interest. Unfortunately, such backdoors in rigged products must always be expected to become public knowledge, or even worse, exclusive knowledge to criminals or other countries state actors. They will take advantage from it, be it financial through ransom demands or ideological through cyber warfare. 

So how can you make sure, that you can trust your equipment? Not all manufactures can be forced to include such backdoors - the legal system at their residence prevents it. Choose a manufacture with an ownership and management with no politically agenda. Last but not least, choose one that allows you to verify their claims of security.

Securosys designs and manufactures its network security equipment in Switzerland. No backdoors have been added to its products. Even more, Securosys equipment is active from the moment it is shipped to the customer. It will inform the customer if it has been tampered with during transport or storage.

Back to previous page

Contact us

Contact us if you want to know more about our products and offering.
Contact us