Secure software and hardware system for managing employees’ workstations

workspations (RWS) within the office network

Options for remote

*RWS-It is a diskless computer that boots a lightweight operating system and offloads all task execution to the server.
Physical
server
User
URM 1
User
URM 2
User
URM 3
User
Mobile workplace
Local network
Local network
Local network
Wan network
Cloud server in a
data center
User
URM 1
User
URM 2
User
URM 3
User
Mobile workplace
Local network
Local network
Local network
Wan network

Network scaling

— branch office vpn

Centralized management
Group
Mobile users
Office
South
Office
East
Office
North
VPN
Instant management of remote users/groups/offices
The use of physical servers or cloud technologies is possible
Data encryption = security
Integration of offices in different cities/countries into a unified secure corporate network
Passwordless login
Crypto key

Quick workplace
configuration

Quick “binding” of a user to iSecure and a crypto key via IMEI:
- Device IMEI/MAC address
- employee profile (accountant, sales manager, quality control department, R&D designer, etc.)
Creating settings - templates for user groups
SOS button - shutdown one or groups of terminals, a department or the entire office
Disabling access to the system when there is no signal
Crypto key = “friend or foe” identifier + ACS key
Passwordless login
cryptokey

Security technologies

Anti-burglary = encryption
The crypto key has a built-in access control system - the owner of the key always carries it with him and cannot enter or leave the office without it
Logins and passwords are not stored on the terminal
Monitoring employee working time tracking
SOS button on the crypto key - disabling the entire terminal/group/office
4 access options: password/login, OTP token, crypto key or any combination of them
HDD in read-only mode
No browser history
Automatic shutdown of the terminal “without the owner nearby”

100% data leak security

The system is designed to avoid standard problems when passwords and tokens are located on workstations
the key holder always carries it with them and won't leave it on the table, since they wouldn't be able to enter or exit the office or move around without it
The crypto key has a built-in ACS
Attackers have no way to use the password.
If the equipment is seized or stolen, there is nothing stored inside.
digital counter for monitoring cybersecurity threats
01
Portable version: laptop or tablet


The portable version of the iSecure terminal can be either a tablet or a laptop, depending on customer requirements
02
Keyboard-integrated version
The iSecure terminal consists of a compact, display-less computer integrated into a keyboard form factor
Hardware and software options
terminals
Main characteristics of the
Portability: laptop or tablet
Consumption less than 10 W
Various versions
Multiplatform solution: Windows, Linux
Powerful 64-bit quad-core ARM processor for keyboard version
No cooler noise
Keyboard and device 2 in 1: easy to replace and connect
Dual FULL HD monitor support
Leave a request or contact us
iSecure 2026
Let's discuss it in more detail