LAD: LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources

Security with LAD

Even if you are not a network pro, you are very likely aware of the never-ending torrent of news about the discoveries of this bug or that bug, or a zero-day exploit making millions vulnerable or a sneaky new piece of malware running the rounds. It is not a surprise that bugs, exploits, vulnerabilities and malware exist – their existence is due to the nature of humans and technology and how the two interact. The problem is that you don’t know whether they are affecting you because most computers and computer-based technology do not offer a way for you to definitively know what it is actually doing with all of its processing power.

In sharp contrast we have our the LateralAccessDevice module, LAD for short. We have designed it in such a way that not only can you use it to monitor your other computing equipment, but you can also monitor it. Yes, LAD is a self-monitoring monitoring system that gives you control and visibility both over what your other computers are doing, but also what it is doing. If you choose to monitor it, LAD’s network communications will be just as visible to you as your other computers' communications. Nothing is hidden.

Additional security features include:

  1. The ability to limit administrative access to LAD to your local area network. What this means is that LAD would ignore any attempts to connect to it from outside and only locally-connected computers would be able to even try to log in.
  2. All communications between LADs are encrypted, as is all data stored by LAD.
  3. The ability to “lock down” your LAD. What this means is that if someone steals your LAD device or its USB stick, you could lock it down until it is recovered and in the mean time no one would be able to access it – it would not give the option to login to the administrative interface or even boot up.

Advantages with LAD

In addition to its own security mechanisms, LAD helps you achieve better network security through visibility and control over network communications. Plus, its integrated switching, routing, firewall and packet capture functions simplify management and save you time and money, not least by reducing multiple single-function devices to just one multifunctional tool.

  • Per-device and per-application monitoring and control
  • DNS, URL and IP address blocking
  • Variable network device segregation and isolation
  • Sophisticated packet capture and recording
  • Network traffic visibility
  • Password-protected remote access, limited to the device(s) you choose
  • NAT traversal

So…

If you have ever wondered whether anyone else is watching the feed from your video cameras…

If you suspect someone else is using your computer, either with or without you…

If you don't want your entertainment system entertaining itself at your expense...

If you suspect your virtual assistant is sharing more about you than you wish...

If you have ever run into your ISP's bandwidth restrictions and don't know how you could possibly be using that many Megs...

If you don’t want your kids sneaking on to the Internet after bed time…

... Let LAD take you back to before the Internet!

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. You can get it already preinstalled on a computer from your own vendor or you can download it directly from this website. The software is the same either way, though the version might be different.