HOME   |   THE ENIGMA 2.0   |   ABOUT   |   CONTACT   |   FUNCTIONALITY   |   CYBER HISTORY   |   WHY THE ENIGMA 2.0

 

"We must forget everything we've done and what we thought we knew until now and approach security very differently.

It's the number of people" utilizing software to attack companies and infrastructures."

 

Given Enough Time and Resources A Hacker will Always Get in Until Now!!! 


 

Functionality

How Does it work?
The Enigma 2.0 is controlled by a desktop LCD. 
By Default the Enigma 2.0 is in the Network Secured Mode.
Touch the LCD button and it goes into the Secured Internet Mode.
Touch the LCD button again and it goes into the Secured Network Mode.
 
It's as easy as that!!!
The user can access the Network or the Internet as they desire seamlessly. Work flow is not interupted.
If they are working on a word document or in a database over the Network, they save their work; touch the LCD button to go to the internet.
They open their email or browser and perform the task they wanted.
When done, they touch the LCD button and return to the network and switch to the program they were working on.
 
 
Secureit4u USA LLC 
300 N. Center Street
Unit Six
Casper, Wyoming, USA
82061
andy@secureit4uusa.com
 

 
HOME   |   THE ENIGMA 2.0   |   ABOUT   |   CONTACT   |   FUNCTIONALITY   |   CYBER HISTORY   |   WHY THE ENIGMA 2.0
Secureit4u USA LLC
300 N. Center Street, Unit Six
Casper, Wyoming , USA 82061