» Zybert Products

» Z1 GEM

Key Information:

  • Provides businesses with security, control and ownership of its business information
  • Allows access to data securely using SSH tunnelling with SPOK device authorisation
  • Document Management services uses Triple A™ system for archiving and file versioning
  • Firewall protection
  • Disaster recovery & backup with hot swappable, fully bootable disks
  • Remote access to network applications
  • SPOK enabled device allows user defined access to your network and applications with no transfer of data or information
  • Function based access control
  • Full integration with Microsoft Windows networks as well as Apple and Android devices

For full specification see Data Sheets

Read More

» Z1 GEM/S

Key Information:

  • Expandable storage capacity up to 2TB
  • Each disk, including backup disks, are only accessible using a unique physical cipher key
  • Cipher keys are required to reboot the system once the machine has been powered off.

  For full specification see Data Sheets

Read More

» GEM GATEWAY

Key information:

  • Secure authentication and strong hardware encryption ensure very high security and performance
  • Allows access to data securely using SSH tunnelling with SPOK device authorisation
  • Fully configured to allow mobile connectivity with the use of SPOK enabled USB, Android and IOS devices

Fully upgradeable to Z1 GEM

Read More

» Gridbox

Key Information: Typical configuration:

  • Two 16 Core ( 64 bit ) processors (32 cores in total)
  • Usable data disk space 6TB
  • 64GB Registered ECC Memory Operating System: CentOS 6.4
  • Sequential read 800MB/s
  • Sequential write 700MB/s

For full specification see Data Sheets

Read More

» SPOK

Key information:

  • PC and Mac,  Android or IOS device access
  • Uses secure SSH tunneling to connect to Z1 GEM or GEM Gateway
  • Secure authentication and strong  encryption
  • No company information is stored or transferred to personal devices
  • Secure Access to email, file sharing and office network applications

For full specification please see Data Sheets

Read More

» Technology

Key features:

  • Operating system – Linux 2.6
  • Networking – Two way router with firewall
  • Security – SSH server providing SSH1,SSH2, SCP and SFTP protocols. Public/Private key authentication
  • Email – SMTP server with virtual hosts, mail filters, SSL/TLS security, authentication
  • Backup & Archive – TripleA™ system
Read More

» Support

Key features:

  • Technical Support
    • On-line user manuals and guides
    • On-line technical support
    • Telephone support
  • System/Hardware Support
    • Software updates
    • Security updates
    • Service Packs
    • Disaster recovery
Read More