We’re a dedicated R&D company that . . .
solves KNOWN endpoint, network and IoT device security problems,
through innovations that add critical DATA SEPARATION
and ISOLATION,



while IMPROVING the user
and Sys Admin experience.
Solutions that . . .
work below the app level
work for all endpoint devices








work inside
IoT devices
Endpoint
Complete OS
1
OS, Kernel, Drivers, RAM
Complete OS
2
OS, Kernel, Drivers, RAM

Even 3 OS's can be done
Patented hardware-enforced multiple,
isolated, complete,
independent operating systems
on a single CPU.
What happens in an OS, stays in that OS.
Mobile Device









Eliminating power and performance problems
while improving security, too.
Making mobile bare-metal virtualization
a practical reality.
Mobile Device

Patented hardware-enforced endpoint firewall
in its own isolated mini-OS,
preventing exfiltration
(even if the user's OS is infected).
Keeping the horse in the barn . . .
even if the barn door is open.
2-Mobile-Devices-in-1



Two physical hardware smartphones or tablets - with 2 complete circuit boards inside – and the look, feel & convenience of a single device.
When 1 truly equals 2.
Major CDR Security and Usability Advances

Viewing the file away from the endpoint
Safe and secure Preview
viewing of an original file, in safe format and without exposing the endpoint to the original file.
If there’s the slightest security doubt,
or need to see
an incoming file just once,
Why not first Just ViewItâ„¢?
Automatic IoT Security with the speed it deserves

Secure and reliable real-time in-device Updates,
Integrity Check and Monitoring
in their own isolated and separate VM/OS.
For IoT updates,
turning days and hours into just seconds.