Downloadable Brochures & Data Sheets

(These PDF files open in a new window.)

(click to download)

Company Brochure

Since 1988, Trusted Systems has been a benchmark of innovation in the field of physical security for classified network endpoints. With a rich history for introducing unique solutions to security challenges, we’ve earned several epithets that include Inventive, Obsessive, Stalwart & Stubborn.   But the characterization we most value and continuously strive to uphold is, “Trusted“.

Trusted Systems
More than Our Name…
It’s Our Mission.

IPS Data Sheets

GSA Approved Class 5 Security Containers

IPS TSM131V30: 13”H x 15”W x 30”D

IPS TSM131WD : 13”H x 21.5”W x 36”D
IPS TSM191D : 19.5”H x 23”W x 39”D
IPS TSM281WD : 28.5”H x 27”W x 45”D
IPS TSM521WX : 51.25”H x 27”W x 52”D

IPS TSM621FWX : 62.5”H x 27”W x 52”D

SafeGuard Data Sheet

(click to download)

SafeGuard Remote Monitor

IP addressable remote monitor, alarm and control system to add physical protection for classified networks, transforming the IPS Container from a standalone facility-based container to a network-centric security appliance.  SafeGuard integrates intrusion protection into the IPS Container itself: a continuous, real-time, watchdog for the IPS lock, door and connected cables.

Each critical element of the IPS Container and the entire length of cable plant are under constant surveillance with the ability to instantly respond to any threat with an immediate response. This establishes a proactive versus reactive solution.

SIPRGuard Data Sheet

(click to download)

SIPRGuard User Authetication

SIPRGuard streamlines network access from the desktop without compromising security, convenience or performance.

SIPRGuard uses two-factor (PIN & Fingerprint) authentication to connect the desktop KVM and Ethernet devices to the network equipment mounted inside a Trusted Systems IPS Container (CAA equivalent).  This authentication precedes and is in addition to the normal SIPR token login without the need to open the IPS Container.

TEMPEST Enclosure Data Sheets

(click to download)
(click to download)

TEMPEST IPS (TIPS) Container

Combined physical protection of GSA Class 5 IPS security container AND high-performance EMI/RFI shielded rack enclosure for COTS rack mounted electronics in classified or sensitive applications.

Approved alternative to classified vault, secure room, or facility build-out.

EMI/RFI Shielded Rack

High performance EMI/RFI shielding for COTS rack mounted electronics.

Broadband RF shielding performance up to 10GHz in the footprint of a standard datacenter rack.

Available in 42U, 30U, 18U and 7U sizes.

Complete customization of input power, data
connections and rack accessories.

Incognito Brochure

(click to download)

Incognito Classified Workstation

Incognito is a custom built, fully functional classified workstation camouflaged to match its surroundings. The Incognito Classified Workstation is designed to conceal the IPS Container, classified IT equipment and the presence of a classified communications node or connection. It’s a security countermeasure to conceal classified activity from prying eyes of guests or uncleared co-workers. This is especially desirable in high profile sites such as GOQs, headquarters offices and conference/training rooms.

SoloSCIF Data Sheet

(click to download)

SoloSCIF Workstation

SoloSCIF Workstation is a Single-User SCIF or SAPF  (Special Access Program Facility) tailored for the requirements of modern-day, classified network portals in which sensitive equipment, interfaces, and information must remain secure from unauthorized access, surveillance, or other threats while remaining flexible to changing environments and needs.

Whitepapers & Policies

Resource Name Resource Link Description
SoloSCIF TS/SCI Workstation Whitepaper download (PDF) Detailed description of the SoloSCIF for securing TS/SCI communication portals.
Intelligence Community Directive 705 ICD-705 (PDF) Intelligence Community Directive Number 705: Sensitive Compartmented Information Facilities (effective May 26, 2010)

If you can't find the information needed...

At Trusted Systems, we understand that unique security-risk variables and environments exist for each location and application, and sometimes the answers to your questions are not readily appearent. If you require more inforamtion than what you can find, please reach out to one of our expert representatives who can help. Please submit a Contact form, or call toll free 800-414-4203.