Corsec Sandbox

Secure your Intellectual Property (IP) from internal and external threats with validated systems and processes

Is Your IP At Risk?

Corsec’s commitment to securing and preserving your Intellectual Property (IP) is second to none. By ensuring supply chain and product access security, you can rest assured knowing your IP is in the hands of trusted security experts, and safe from:

Product Damage

Hazard Circle

Viruses

Virus Circle

Espionage & Theft

Theft Circle

Hackers

Hacker Circle

Phishing

Phishing Circle

Malware

Malware Circles
Require your partners to meet industry standards for IP protection

Is Your IP At Risk?

Corsec’s commitment to securing and preserving your Intellectual Property (IP) is second to none. By ensuring supply chain and product access security, you can rest assured knowing your IP is in the hands of trusted security experts, and safe from:

Product Damage

Hazard Circle

Hackers

Hacker Circle

Espionage & Theft

Theft Circle

Viruses

Virus Circle

Phishing

Phishing Circle

Malware

Malware Circles
Require partners meet industry standards for IP protection

SECURE YOUR INVESTMENT

Corsec Sandbox

Corsec’s Sandbox is an ecosystem used to protect your Intellectual Property (IP), including: a secured facility accompanied by a custom engineered laboratory that meets industry security requirements for connectivity and physical access, screened and trained personnel to manage and test your solution, and validated systems and proven processes to protect against unlawful access to data and products.

Physical Security & Controls:
  • Electronically-controlled and logged two-factor access portal that exceeds Common Criteria requirements
  • Independent environmental controls with backup for safe and continued operations
  • Security monitoring system with video recording 24/7/365
  • Limited physical access control policy
  • Personnel and logical material controls
  • SFTP, PGP, safe storage of digital storage media, & material destruction
Secured Connectivity:
  • FIPS 140 Level 2 validated Unified Threat Management system including VPN, and Intrusion Prevention
  • Stateful Traffic Filter Firewall Extended Package & High Availability firewall configuration
  • Switched gigabit LAN (with 10GB capability)
  • VLAN architecture & Isolated lab VLAN
Staffing & Support:
  • Corsec’s security experts are all extensively trained and cleared to work with highly sensitive information, ensuring that every product is monitored and safeguarded to guarantee each and every client investment.
  • Dedicated laboratory staff to setup up, configure, and manage customer equipment and supporting infrastructure.
  • Dedicated software engineering group for Algorithm testing and execution, & Entropy Analysis
  • Corsec visitors are escorted through our facility to protect customer IP
  • Document review process ensures that public-facing documentation contains no customer IP
  • All work machines are password-protected, using best-practice password policies
  • Up to 40U rack space per customer and Per-rack UPS protection
  • Additional requirements can be accommodated
Operating Systems:
  • Apple
  • Google
  • Microsoft
  • Oracle Solaris
  • Red Hat developers license
  • RHEL
  • *BSD
  • DragonflyBSD
  • FreeBSD
  • NetBSD
  • OpenBSD
  • Linux
Core Platforms:
  • VMware vSphere 6.5 with multiple ESXi hypervisors
    • 224GB physical RAM, with empty slots available
    • 40 virtual processor cores
  • Primary SAN
    • Redundant: controllers, NICs, and switches
    • 13.2TB raw storage, 8.4TB in RAID
  • Backup SAN
    • 17TB raw storage, 11.3 in RAID
  • Individual Windows workstations, up to 3 per customer. Additional requirements can be accommodated through explicit agreement
  • Supporting infrastructure, including:
    • Active Directory
    • DNS
    • NTP
    • syslog

GET STARTED WITH CORSEC