NETWORK SECURITY
Secured WiFi Connections,
Networks, & IoT Devices
In the Click of a Mouse
The Internet of Things (IoT) is producing more and more connected gadgets, while mobile users are getting online using any device and connection they can find. These are all potential holes in your network security, threatening to take down your organization if attacked.
With the modern-day office becoming more dependent on IoT devices, and all work shifting towards being more reliant on technology, protecting your devices is becoming increasingly more important. How do you protect your devices (laptop, printers, smart assistants, etc.) without having to go through multiple steps just to fully encrypt your devices?
Fognigma protects your WiFi connections, networks, and IoT devices so your organization stays secure. Best of all, Fognigma is accessible in three simple ways, so your devices and users can always stay protected.
Protect single users, small groups, IoT devices with
WICKETS
Wickets are small portable misattribution devices that connect to a Fognigma VPN and protects single users and small groups, as well as IoT and other network-enabled devices. Once plugged into a Wicket, your device will have the full power of Fognigma's protection. The intuitive Wicket User Interface lets you easily control all aspects of your devices' connections. Wickets allow you to take your encryption with you.

Protection For Any IP Device
The perfect solution for protecting IoT and IP-enabled devices. Automatically connect your VoIP phone to your Fognigma telephony system by attaching a Wicket to your phone. Protect any IoT device or multiple workstations by placing a Wicket between your modem and router. Any device connected to that router's WiFi connection is protected by the Fognigma network.
Device Locking
The Wicket can be locked from the GUI remotely or by the user. Once locked, all sensitive information on the device is protected in an encrypted storage area and cannot be accessed until a PIN is entered to restore functionality.
Secure, Portable Access
Wickets are small, easy to carry, and simple to set up. Even a non-technical user can completely secure and obfuscate his or her network activity, while at home or on travel, simply by connecting one side of the Wicket to whatever Internet access is available, and then plugging anything, from a VoIP phone to a wireless router, into the other side.
Remote Support
Administrators can access the Wicket securely and remotely in order to reconfigure it or assist a user in getting it set up.
GATEWAY
Full Facility Protection
Gateways are permanent versions of Wickets and protect your entire facility without the need to plug in multiple devices. Install a Gateway between your firewall and router, and then your users can simply log in to be protected by the awesome power of Fognigma.
Built-in Misattribution
With Gateways, users are automatically connected to a secure VPN before they ever reach the Internet, so their online activities are dissociated from their worksite and appear to be originating at a Fognigma Ext Point unique to their selected VPN.
Network Administration Portal
Using the Gateway's administrative portal, designated administrators can view user activity, manage connections and user permissions, and control advanced Gateway settings and processes.
Complete Visibility
Because Gateway sits at the perimeter of your network, like a firewall, none of your users' traffic is obscured while it is inside your corporate network. So all of your existing network monitoring. logging, firewalls, and IDS/IPS solutions will still work.
Multiple User & VPN Support
One Gateway can handle multiple users and VPNs, providing flexibility in managing and securing work. Users can collaborate in one VPN, or have their own separate VPNs. This way they are never associated with each other and can never compromise each others data.

Software Client
The Fognigma software client is easy to use and provides fast access to your Fognigma-protected network and communication components.
It's accessible using your Windows, Linux, or Mac devices. You can also access the Fognigma software client via a mobile app, so you're protected on any device. It's as simple as using your credentials to log in, choosing your entry & exit points, and resting assured that you're fully encrypted.
Rapidly Deployable
Rapidly Deployable Fognigma file share access can be granularly controlled by an organization’s administrators. Users are given access to only the folders and files they need to access and are not able to reach any other section of the file share.
Granular Use Controls
Granular Use Controls One of the best ways to prevent insider threats is to limit user access. MPNs give admins granular user controls, allowing Identity and Access Management to be easily monitored and adapted, as needed.
Globally Accessible
Globally Accessible Your operation can take you all over the world, and your network needs to be there with you. MPNs can be accessed anywhere in the world to make sure you have the tools you need for mission success.
Works On Any Device
Works On Any Device Users need to be able to access your network on whatever device they’re using. MPNs work on desktop and mobile devices running all major operating systems (Windows, Linux, macOS, iOS, and Android).