PEEPS Icon

Portable Device Protection

Isolated digital devices and airgapped networks often provide a false sense of security to organizations. Digital controllers, sensors, valves, actuators, and other equipment are usually maintained via portable maintenance and testing equipment. This setup offers trivially exploitable pathways for both active and passive inside attacks.

Proliferating Portable Threats

Amid rising geopolitical tensions, critical infrastructure-focused threats like STUXNET, TRITON, Bauxite, Sandworm, and Volt Typhoon have heightened their targeting of industrial organizations. In this threat landscape, InfraShield’s Portable Electronic Equipment Protection System (PEEPSTM) offers organizations an AI-powered last line of defense to protect their industrial equipment and CDAs.

Our Solution

PEEPSTM mitigates the risks associated with Advanced Persistent Threats (APTs) by implementing:

  • 100% Zero Trust Model
  • Hardware, Software, and Application Whitelisting
  • Hardware and Software Tamper Resistant Design
  • Individual Accountability
  • Protection of Legacy Maintenance Equipment
  • Prevents Rogue Devices From Being Introduced
  • Only Known-Good Data Transfer is Permitted
  • All Assets Physically and Logically Protected
  • Double Accountability
  • Multi-Factor Authentication (facial recognition, hand geometry, fingerprint, keycard, PIN)
  • Open Architecture Computing Environment (OACE)

Why PEEPSTM

PEEPSTM leverages industry-trusted smart cards to establish hardware-based trust boundaries around every portable device entering your environment. By requiring each device to present a unique, tamper-resistant credential, PEEPSTM ensures that only authorized, “known-good” equipment can connect—dramatically reducing the risk of unauthorized data exfiltration or malware introduction.

PEEPS smart card with lanyard (front)
PEEPS smart card with lanyard (back)

Request a Demo Today

Need assistance? Whether you’re looking for general information, exploring partnership opportunities, seeking technical support, or reporting a cyber threat, we’re here to help.

Connect with our team and access tailored solutions to keep your business secure and supported every step of the way.

Select Topics: