Tresys XD Air
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Values

Ensure Security and Business Continuity

Manage Risks

Tresys XD Air

XD Air™ is the only U.S. Cyber Command-approved tool for the transfer of classified data using portable media.

Description

 XD Air is an integrated hardware/software package that inspects and cleans files on portable media of malware and other malicious content. A laptop-based kiosk, XD Air was developed in conjunction with the National Security Agency as a file sanitization tool to enable the safe use of portable media. In the six years since its development, more than 1,000 XD Air systems have been successfully deployed in government, nuclear, and commercial environments.

Application Flexibility Proven in a variety of government and critical infrastructure applications, XD Air:
  • Protects against media-borne and data-borne threats when transferring data to secure or critical networks.
  • Enables assured transfer of classified data between high-risk networks using portable media (meets the requirements of JTF-GNO CTO-10-004A for Removable Flash Media Device Implementation).
  • Assists in publishing digital documents by exposing hidden content and verifying cleansing before release—helping ensure that classified or confidential data is not inadvertently disseminated.
  • Verifies the authenticity of content from trusted sources.

How It Works
  • Inspects and cleans files on removable media to mitigate the risk of introducing malicious content
  • Offers three methods of protection: Known Good, Known Bad and Known Source
  • Applies advanced filtering techniques to perform deep content inspection of complex file types, exposing hidden threats and data missed by conventional antivirus and anti-malware protection
  • XD Air is hardened against attacks from media-borne malware
  • Securely erases media

User features

Roles of Interested Employees

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Certification requirements for products in country

Сonfidential data

Personal data operation