Over The Air iOS Provisioning and Distribution for iPhone and iPad

iPhone and iPad integration for your business: configuration profiles over-the-air with SCEP, VPN, E-Mail, Wi-Fi, MDM payloads.

Products and services are based on the best Open-source solutions

We utilize only open-source software with commercial or community support

Public Key Infrastructure (PKI) for corporate users

We offer highly adaptable and supported PKI solutions, from consultancy till "ready-to-use" Managed PKI

Products and services

Even in a small company of up to 50 workstations, it would be difficult to manage digital certificates manually. Certificates have to be not only installed, but also revoked or renewed in time before expiration.

INFOSS VPN Box

INFOSS has developed a full solution for providing secure VPN access to company’s network for employees from any place with Internet connectivity.

Secure access to the company’s network for your employees.

Perfect solution for small- and medium-sized companies.

We offer solutions for Apple iOS, OS X, Android, Cisco IOS, Linux, FreeBSD and Windows

INFOSS Secure Mail

We are proud to serve telecom and ISP operators, with added value, in everyday business. With our INFOSS secure mail solution, you are guarantee secure vpn mail, between you mobile device and your e-mail provider. Ask your current e-mail provider if they provide INFOSS secure mail.

We offer solutions for Apple iOS, OS X, Android, Cisco IOS, Linux, FreeBSD and Windows

Public Key Infrastructure (PKI)

A public-key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository, and revokes them if needed.

We offer solutions for Apple iOS, OS X, Android, Cisco IOS, Linux, FreeBSD and Windows

Certificate Auto-enrollment

Our solutions introduce the capability to automatically enroll users and computers with certificates, including smartcard-based certificates.

Using the autoenrollment feature, organizations can manage the certificate lifecycle for users.

We offer solutions for Apple iOS, OS X, Cisco IOS and Windows

Security audit

A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.

A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices.

We offer solutions for Apple iOS, OS X, Android, Cisco IOS, FreeBSD and Windows

Mobile Device Management for enterprise

Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc.

This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers.

We offer solutions for Apple iOS and Android

Secured web-servers

To secure a Web server, you must apply many configuration settings to reduce the server's vulnerability to attack. So, how do you know where to start, and when do you know that you are done?

We offer solutions for Linux, FreeBSD and Windows

VPN-based solutions

Internet VPNs for Remote Access

VPNs for Internetworking

Intranet / Local Network VPNs

We offer solutions for Apple iOS, OS X, Android, Cisco IOS, FreeBSD and Windows

Technology

We use only best open-source technologies and products

Microsoft Autoenrollment

Microsoft Autoenrollment

Autoenrollment is a useful feature of Active Directory Certificate Services (AD CS). It allows the administrator to configure subjects to automatically enroll for certificates, retrieve issued certificates, and renew expiring certificates without requiring subject interaction.

EJBCA

EJBCA. PKI by PrimeKey

EJBCA is open-source public key infrastructure (PKI) certificate authority software.

EJBCA supports the major standards in the PKI area, such as X.509, OCSP, CMP, XKMS, SCEP, and Elliptic curves, including the new Card Verifiable Certificate (CVC) EU standard for machine readable passports containing fingerprints, which will be mandatory as of June 26, 2009.

EJBCA supports all common asymmetric encryption algorithms, RSA, DSA and ECC, as well as the modern hash algorithms, SHA1, SHA256, SHA384, SHA512.

IPSec

IPSec

Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.

IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).

OpenVPN

OpenVPN

OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol[2] that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls.

OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol, and contains many security and control features.

strongSWAN

strongSWAN

strongSwan is a complete IPsec implementation for Linux 2.6 and 3.x kernels. The focus of the project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface.

A unique feature is the use of X.509 attribute certificates to implement access control schemes based on group memberships. StrongSwan interoperates with other IPsec implementations, including various Microsoft Windows and Mac OS X VPN clients. The modular strongSwan 5.0 branch fully implements the Internet Key Exchange (IKEv2) protocol defined by RFC 5996

Hewlett Packard ProLiant servers
Tier4 datacenter
Redundant components
Backup communication links
VPN servers with cryptographic accelerators

About

INFOSS AS is located in Oslo, Norway

Jo Einride Lid Lerheim
Jo Einride Lid Lerheim

CEO

lerheim@infoss.no

Mobile: +47 4611 1111

Henrik Gram
Henrik Gram

Network Architect

Jakob Lind
Jakob Lind

Scala Developer

Maxim Izergin
Maxim Izergin

CTO

History

project was launched in May 2014

project was launched in October 2013

project was launched in June 2013

Activities

Full VPN, Smart-cards and PKI solutions for private and corporate customers. VPN proxies based on IPSec, PPTP, OpenVPN and L2TP over IPSec with authorization based on certificates with SCEP enrollment. Fast implementation, customization. Technical support 24x7.

Virtual Private Networks

A VPN supplies network connectivity over a possibly long physical distance. In this respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video conferencing and similar network services. Virtual private networks generally don't provide any new functionality that isn't already offered through alternative mechanisms, but a VPN implements those services more securely/efficiently in most cases.

Public Key Infrastructure

A public-key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which are used to verify that a particular public key belongs to a certain entity. The PKI creates digital certificates which map public keys to entities, securely stores these certificates in a central repository, and revokes them if needed.

Mobile Device Management

Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc.

Contacts

General information
Technical support