Our Products

What we Produce

Black Pearl SXI

We are experiencing unprecedented times where our adversaries have infiltrated nearly every conceivable technology platform and system used to protect our citizens and our nation. These infiltrations cause geopolitical, social, and economic destabilization and unauthorized penetrations that provide our adversaries opportunity comparable to the use of a nuclear bomb, without radiation or a mushroom cloud.

In today’s pandemic world, work will continue from home or remote insecure environments. Sensitive information is easy to collect and steal from stationary targets outside of office environments. Individuals and organizations are being exploited today with increasing frequency, speed, and stealth due to our new work environments. Our adversaries are using readily available open source technology that steals credentials, usernames, passwords, and sensitive data. The adversarial technologies also inject ransomware, conduct corporate espionage, steal intellectual property, trade secrets, exfiltrates money, and ruin reputations.

  • Federal Information Processing Standards (FIPS) 140-2 Level 3 and NSA Common Criteria Evaluation Assurance Level (EAL) Level 5 components
  • Government (HSPD-12) compliant smart card eliminating the use of username/passwords for authentication, signing and encryption
  • Tamper protected zeroization (data wiping)
  • High entropy Pseudo Random Number Generator for certificate issuance and signing of device peripherals
  • Anti-cloning preventing supply chain infection and counterfeiting
  • Split knowledge algorithms and secure key backup and recovery
  • Signal radiation masking for monitors, keyboard, mouse, printers,remote projector and other approved peripheral devices
  • 24 7 365 customizable continuous monitoring services and support against advanced cyber and physical threats

Black Pearl ™ Protection Profile

What is the Black Pearl SXI? Trusted People, Trusted Devices, Trusted Design

The Black Pearl SXI™ is a echosphere of trusted people, trusted devices, and trusted design that provides a confidential environment for home and remote computing. The Black Pearl SXI™ meets high assurance cyber and physical security mission requirements using NSA and DoD approved encryption (FIPS 140-2 level 3). Each device is secured using unique digital identifiers bound to the user, mitigating spoofing, impersonation, and identity theft attacks.

The Black Pearl SXI™ is compliant with (DFARS) DefenseFederal Acquisition Register and (NIST) NationalInstitute of Standards and Technology requirements for protecting (CUI) confidential andunclassified Information in government, critical infrastructure protection sectors, and other regulated environments.

Its unique design has built-in Electromagnetic Interference (EMI) and Electromagnetic pulse shielding (EMP), protecting users from threats such as signal jamming, eavesdropping, and magnetic destruction of data.

The Black Pearl SXI™ offers NATO rated TEMPEST and DoD mission-critical Security Technical Implementation Guidelines (STIG) protection, referring to how a system is secured against adversarial spying of computer systems through misconfiguration, leaking emanations,including unintentional radio or electrical signals, sounds, and vibrations.

Black Pearl™ - Enterprise Commercial
and Government Models available

  • Made in America BAA/TAA Compliant
  • Intel 10th generation I7 Core Processor Windows 10 Professional Made in USA
  • 1TB SDD Hard Drive 32 GB DDR4-2666 RAM, USB 3.1 with 1GB Ethernet Ports, SXI Crypto Micro SD cryptographic controller
  • External HD Projector, RJ-45 Cellular CDMA Adapter
  • Ports: HDMI, Smart Card Reader, Microphone/ Headset/ Internal Speaker
  • TEMPEST shielding (EMI gaskets on all external ports and connectors)1
  • TEMPEST shielding (EMP protection using military grade faraday materials)2

1 TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions) is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.

2 TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also knownas emission security (EMSEC), which is a subset of communications security (COMSEC).