Over twenty-five years of delivering trusted information exchange solutions

Case study iconTo help you understand the different options for exchanging information securely across domains or networks here are a selection of the trusted solutions we have delivered for our clients.

Due to the sensitive nature of these projects we are not able to disclose the details of the organisations in question within the public domain. If you want to find out more about any of these case studies, please get in touch directly, and we may be able to provide further details.

Explore our case studies


An Information Based Sharing Model (CSIIS)

The ways we create, store and share information are changing. New ways of keeping this information secure are needed if we want to continue working efficiently in a more open environment. This case study looks at how we took part in a research project that was awarded Best Research Poster at the Annual Symposium of the UK Information Assurance Advisory Council (IAAC). MORE DETAILS


Communicating Between Nations (A Multi-Nation Defence Organisation)

When you are working closely with others, you need to have access to their information and want to give them access to yours – but not necessarily to all of it. You also need to be sure that providing access to legitimate users of your information is not opening your system to unwanted intrusion. This case study looks at how we developed an Information Exchange Gateway solution that allows nations to share information, but without sharing more than desired. MORE DETAILS


Connecting Multiple Networks Securely (European-based Programme)

Seamlessly moving data between networks is a key requirement for many large organisations to meet their operational needs. A cross-domain gateway and technology integration specialist can help your organisation adopt more modern ways of working in a secure manner. This case study looks at how we were chosen by Leidos (formerly part of Lockheed Martin) to create a solution for a large European-based programme. MORE DETAILS


Developing an Email Guard for NATO

NATO needed an email guard that met their specific requirements, with the ability to manage the variations in its members’ systems. Nexor had the expertise to create one: Nexor Sentinel. This case study looks at how we developed an email guard for NATO that could cope with the different message structures of the 28 individual member states. MORE DETAILS


Guarding Military Messages (A European Navy)

No matter how good your policies and protocols are, human error can mean a message is accidentally sent somewhere (and seen by someone) inappropriate. When you need to ensure your policies are followed, you need an email guard. This case study looks at how we developed a solution which allowed the Navy to easily upgrade their current systems and expand it to meet their requirements. MORE DETAILS


Importing Patches to a Secure Network (A UK Government Agency)

Often you need to transfer patches or system updates from one network to another that have different levels of security. In order to maintain the confidentiality of the downstream server you need to be able to control the flow of data in a secure manner. This case study looks at how a Data Diode solution was used to import updates to a closed classified network at Impact Level 5 (IL5). MORE DETAILS


Keeping Sensitive Military Information Safe (A Military Organisation)

In a military force, the management of information and the security of data transfer are both of paramount importance. Networks have to be kept updated and safe from external threat. A variety of information has to pass between internal networks of differing security classifications. This case study looks at how we used Data Diodes to provide secure network monitoring and system updates to allow the Military organisation to have better management of the different security classified networks. MORE DETAILS


Making Communications and Information Systems Flexible and Responsive (The Defence Science and Technology Laboratory (Dstl))

The UK security operating environment is becoming increasingly complex with multiple, rapidly-forming coalitions of organisations with differing security classifications. Within this arena, there will always be the need for critical data sharing between key players in real time, with high assurance information transfer between security domains. This case study looks at the high assurance components we supplied for the PANDORA programme for the UK Ministry of Defence. MORE DETAILS


Making your Data Tamper-Proof (A UK Government Agency)

Sometimes keeping information safe means more than making sure you find it when you need it. You also need to be sure no-one has access to it – no tampering – especially if you may need it as evidence in the future. This case study looks at how we developed a solution that allowed files to transfer to a SECRET domain seamlessly without disrupting normal operation. MORE DETAILS


Network Monitoring (A UK Government Agency)

Monitoring activity in a network is critical to maintain the availability of systems and reduce the likelihood of an attack affecting business operations. Where an organisation has multiple networks, monitoring becomes more difficult and less manageable. This case study looks at how a solution was developed that allowed the networks to be connected for monitoring purposes by guaranteeing a one-way transfer mechanism. MORE DETAILS


Researching Secure Boot in Linux (A European Organisation)

When your trusted experts don’t have the answer, you need someone with the understanding to do the research and the expertise to develop and demonstrate the solution. This case study looks at how we were approached to research the components needed to configure secure boot on the Ubuntu Linux platform. MORE DETAILS


Secure and Efficient Manual Release of Files across Networks (A European Multi-partner Organisation)

Organisations can transfer files between networks using USB sticks, but this is an insecure and inefficient practice. Using data diode and data guard technology can significantly improve the speed, control and security for organisations in sharing files across its different network domains. This case study looks at how we developed a solution using Nexor Data Diodes and Nexor Guardian to allow manual release of files across different classified networks. MORE DETAILS


Secure Remote Video Control (A European Defence Ministry)

When you have remotely controlled cameras in operation you need to find a secure way of receiving information from the cameras and a secure way to control them without leaking information. This case study looks at how we developed a solution that allowed information to be securely sent and received from a secure control room to remote cameras. MORE DETAILS


Securely Available Information (A European Rail Network)

When you are using a number of disconnected systems to manage critical infrastructure, none of which talk to each other by design, you need to get information out of these systems without the risk of introducing anything nasty. This case study looks at how we developed a solution that allowed information to be sent over two disconnected systems securely. MORE DETAILS


Securing the Connected Car (A Leading Global Automotive Supplier)

As the concept of the connected car gains momentum and the amount of software in a car rises sharply, the level of cyber risk increases too. When a cyber attack could be a potential matter of life and death then a comprehensive approach must be taken in order to reduce the cyber vulnerabilities. MORE DETAILS


True Coalition Interoperability (UK Ministry of Defence)

There are times when you need to securely get access to information from another system without any idea of how that other system works. You may be working with another organisation, or may simply need to be able to access information from a secure system using a less secure one. This case study looks at how we partnered with two other organisations to develop a solution that allowed signalling information to be accessed from another system quickly and securely. MORE DETAILS


Upgrading an Existing System (A European Navy)

When you are using something that works well, you do not want to change it. Sometimes there is no choice – you need to address something as other factors change. In this case, the vulnerability was the available support for the operating system, meaning that every component of the system was affected. This case study looks at how we helped a European Navy upgrade its Military Message Handling System to a new platform. MORE DETAILS


Talk To One Of Our Experts

We value your privacy


Press Release – Guardian 3.1 – High Availability

Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...

Making Effective Use Of Zero Trust Security

One year on from our introductory blog on Zero Trust Architecture,  what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...

Cyber Essentials – Under The Bonnet

What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks.  Cyber-attacks can come in many forms and may be carried out against businesses of any size of...

Be the first to know about developments in secure information exchange