How it works


Unknown media and content


Multiple antivirus engines


Content disarm and reconstruction


Known media with clean content


Filter through whitelist


Cleaned files


Sign content


Known media with clean and signed content


Signed content

Click on each row for detailed explanation
Terminal Tempest        High Assurance Industry        Basic       
Harddrive write protection Hardware Hardware Software Software
Optional CDR filter
Additional AV Engines


USB-blocking hardware

Custom CA option

On premises server system option

USB drive whitelist


Tempest Level A

USB 3 support

Max RAM 16 64 32 16
Standard CPU i5 i7 i5 i3
CPU generation 4 12 12 12

A hard drive with write protection enabled allows you to view and access its data, but prevents you from making any changes to it. In order to utilize the full functionality of the hard drive, the write protection must be removed. Our hardware-protected hard drive comes with a physical key that can put the drive into administrative mode. When in administrative mode, only authorized AV definitions, configuration files, and firmware updates that adhere to the manufacturer's specified format can be accepted. This ensures the integrity and security of the data stored on the hard drive.

The Content Disarm and Reconstruction (CDR) filter is an advanced security measure that performs a thorough examination of specific file types. This optional filter conducts a deep inspection of files, checking for any executable code or discrepancies from the file's specifications. If any issues are detected, the CDR filter can either rebuild the file to remove any potential threats or flag it as potentially malicious, providing an additional layer of protection against cyberattacks.

The terminal's default security setup includes Cisco's ClamAV and Microsoft Defender for Endpoint, serving as the baseline antivirus (AV) engines. Depending on the terminal, there may be additional AV engines available, with brands and quantities subject to change over time. During each scan, two AV engines will be selected at random from the available pool, maximizing the likelihood of identifying any potential threats and ensuring that the terminal remains secure against evolving cyber threats.

The option to copy all suspected malicious files, along with their corresponding log files, to a separate USB media for further analysis. This feature allows security personnel to safely isolate potentially harmful files and study them in a controlled environment, without risking the files infecting other systems. With the files safely contained on a separate USB media, security experts can better understand the nature of the potential threat and take appropriate action to mitigate any damage.

The USB blocking hardware is a security feature that allows the terminal to physically lock down all USB ports, preventing any external devices from being connected until the bootup procedure is completed. This technique serves as a data leakage prevention measure, designed to protect the terminal from malicious removable storage devices that may attempt to steal data or otherwise compromise the system via USB ports. By physically blocking USB ports, the terminal can safeguard against unauthorized access and ensure that only trusted devices can be connected, thereby reducing the risk of cyber threats and potential data breaches.

A certificate authority (CA) is a reputable organization that is authorized to issue digital certificates, which are used to authenticate the identity of content or services. If you want to add your own digital certificates, you will need to utilize this functionality. By adding your own certificates, you can establish a trusted identity for your content, ensuring that users can authenticate the content's source and be confident in its authenticity.

The Hunna server system is an all-inclusive solution that provides all necessary hardware, operating systems, software, and programs required for creating the necessary AV definition packages. This system includes multiple servers, diods and firewalls. By running the Hunna server system on-premises, you can benefit from enhanced security measures that help protect your data from external threats. Keeping the system on-premises enables you to maintain complete control over your data and infrastructure, providing a secure environment for your organization's critical operations.

The USB drive whitelisting feature provides administrators with the ability to grant access to authorized USB devices by adding them to the Allowed List. This can be done using various parameters such as vendor, product ID, and serial number of the USB media. By maintaining a whitelist of approved USB devices, administrators can significantly reduce the risk of unauthorized access or data breaches that may occur through the use of unapproved USB drives.

An Application Programming Interface (API) is a collection of defined protocols and tools for building and integrating application software. The Hunna terminal includes API functionality, which allows you to add your own filters and customize the system to suit your organization's specific needs. By leveraging the API, you can integrate your existing applications with the Hunna system, enabling you to achieve greater functionality and efficiency. This feature offers flexibility and enables you to tailor the Hunna system to your organization's unique requirements.

Electrical and electronic equipment emits electromagnetic radiation, which, if intercepted and analyzed, can reveal information contained within the signals. Even when located at a distance, a receiving device can intercept these signals without being detected, and access to the original equipment is not required. To ensure the highest level of protection against such interceptions in NATO Zone 0 environments, the NATO SDIP-27 Level A standard is the strictest certification available. A terminal certified to this standard offers the most robust protection against revealing electromagnetic signals that may contain sensitive data. By utilizing a NATO SDIP-27 Level A certified terminal, organizations can mitigate the risk of data leakage and ensure the confidentiality of their sensitive information, even in the most demanding and sensitive operational environments.

Missing description

Missing description

Missing description

Missing description

Missing description

Get in touch

Finding something you like? Contact us for more information.

Info@hunna.eu +46 (0)8 98 68 60

Get in touch

Finding something you like? Contact us for more information.

Info@hunna.eu +46 (0)8 98 68 60