I come from the field of and I am interested in

Providing High Security Access for Mobile Users Connecting to Restricted Networks

Employees who travel regularly may need to access your network via laptop to carry out tasks such as retrieving and processing data, using internal applications online, etc. This should be simple to do, regardless of the employee’s location and using all of today’s channels of communication.

These are the requirements of the users, but an important question remains: How is reliable IT security ensured during remote work? After all, sensitive data is to be transferred via the Internet and processed on laptops. And – even more serious from the perspective of security – access is to be granted into your LAN with all of its confidential information. It is therefore essential that third parties be neither able to read or manipulate the data that is being transferred nor abuse the access to your LAN.

Top Highlights

  • Two strictly separated work environments on one laptop for maximum protection of confidential information

  • High-security VPN connection via mobile telephony, WLAN, and Ethernet

  • Approval for classification levels German VS-NfD, NATO RESTRICTED, and RESTREINT UE/EU RESTRICTED

Card Icon


All benefits of vs-top at a glance

  • Secure connection of mobile employees
  • Two strictly separated work environments on one laptop
  • Easy to operate thanks to the use of familiar standard applications
  • High-security VPN connection via mobile telephony, WLAN, and Ethernet
  • VPN technology "Made in Germany"
  • Reliable hard drive encryption
  • Approval for classification levels German VS-NfD, NATO RESTRICTED, and RESTREINT UE/EU RESTRICTED
  • Advanced update mechanism protects against attacks with quantum computers
  • Easy administration via management station
  • Customer service directly from the manufacturer

Laptop Security That Is Simple to Operate

The vs-top laptop ensures that mobile personnel are able to connect securely to sensitive company and official networks. The security laptop achieves this through two separate working environments: One can be equipped with conventional Windows or Linux applications, such as browser, e-mail programs and word processing programs. The second working environment is used exclusively to process sensitive data. Encrypted connections from this environment to your network are established via mobile telephony, WLAN or Ethernet using an integrated VPN (Virtual Private Network) solution, made in Germany. With the vs-top, your users can comfortably work anywhere.

Approved for Classification Level RESTRICTED

vs-top has been approved by the German Federal Office for Information Security (BSI) as meeting the requirements of classification levels German and NATO RESTRICTED and RESTREINT UE/EU RESTRICTED. This allows mobile employees of public authorities, the German armed forces and companies to use the security laptop to work with classified data.

Secure Connection to Networks Classified as Restricted

Central Administration via Management Station

The security components on the vs-top are centrally administrated by the Central Management Station genucenter. This means that you can set up the desired configuration for all mobile users from a central location as well as modify it and install updates at any time, ensuring consistent implementation of your security policy. You thereby achieve a very high level of mobile security.

High Security Through Strict Separation

The key to the high level of security is the strict separation between the internal areas. This is because applications such as e-mail programs or browsers offer numerous avenues of attack. If attackers or malicious software should manage to, e.g., compromise the browser, they must be stopped from accessing the working environment for sensitive data or, even worse, from accessing your network via VPN. The strict separation in the vs-top is made possible by the L4 separation system, which runs in the background, unnoticed by the user.

No Way Through for Attackers or Malicious Software

The L4 separation system used on the security laptop creates strictly isolated compartments for each working environment: the browser, mail and office applications are locked in one compartment, the working environment for sensitive data in a second. Located in a third compartment are the VPN gateway and firewall security systems. Each compartment is equipped with its own operating system and is therefore fully independent of the others.

This systematic separation means that attackers or malicious software cannot break out from one working environment into the next or, worse, into the security systems. Through the use of the separation technology, the compact vs-top provides a level of security that up until now could only be achieved with the use of additional, separate hardware. In addition, the sensitive data on the hard drive of the security laptop has been reliably encrypted and can only be accessed with a corresponding smart card and PIN. Even if the laptop is lost, no one can access your data.

Post-Quantum Cryptography: genua Meets Future Security Requirements

With products from genua you can make the transition to post-quantum cryptography. Our update mechanism guarantees trustworthy product updates today and in the future: In addition to a digital signature for maximum security according to current standards, the addition of a quantum-resistant signature already provides effective protection against attacks with quantum computers.

A Safe Investment in Accordance with the BSI Recommendation

Experts assume that in a few years, quantum computers could weaken or even break the current cryptographic methods. The security of the XMSS method developed by genua in cooperation with the Technical University of Darmstadt and the Technical University of Eindhoven is well understood today. By applying this method, we meet the recommendations for future-proof software updates according to the German Federal Office for Information Security (BSI) and the National Institute of Standards and Technology (NIST).

Knowledge Base

As a collaborative learning company, it is our mission to continuously improve and share our knowledge of IT Security with you. In our Knowledge Base we offer you articles, white papers, analyst reports, research results, videos and more in the field of IT security.

Case Study

German Armed Services: Infrastructure for the Communication of Restricted Data

The IT strategy of the German armed services calls for the digitization of operations. At the same time, demands on IT security and usability for modern and attractive IT workplaces are increasing. Furthermore, more and more logistical and administrative tasks are being supported and represented using IT and apps.

Read Article

Our sales team will be glad to answer your questions. We are looking forward to get in touch with you.

Contact Us