LAD: LateralAccessDevice

takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources

Security with LAD

Even if you are not a network pro, you are very likely aware of the never-ending torrent of news about the discoveries of this bug or that bug, or a zero-day exploit making millions vulnerable or a sneaky new piece of malware running the rounds. It is not a surprise that bugs, exploits, vulnerabilities and malware exist – their existence is due to the nature of humans and technology and how the two interact. The problem is that you don’t know whether they are affecting you because most computers and computer-based technology do not offer a way for you to know what it is actually doing with all of its processing power (or its power of communications, for that matter).

In sharp contrast we have our LateralAccessDevice system (LAD for short). We have designed it in such a way that not only can you use it to monitor your other computing equipment, but you can also monitor it. Yes, LAD is a self-monitoring monitoring system that gives you control and visibility both over what your other computers are doing, but also what it is doing. If you choose to monitor it, LAD’s network communications will be just as visible to you as your other computers' communications. Nothing is hidden.

Additional security features include:

  1. The ability to lock administrative access to LAD to your local area network. What this means is that LAD would ignore any attempts to connect to it from outside and only locally-connected computers would be able to even pull up the login page and try to log in.
  2. Encrypted storage. All data stored by LAD is encrypted.
  3. In-house DNS services. WIth LAD you get your own DNS server, making you less vulnerable to DNS-based exploits.

Advantages with LAD

In addition to its own security mechanisms, LAD helps you achieve better network security through visibility and control over network and Internet communications, both by IP address and domain name. Plus, its integrated switching, routing, firewall and packet capture functions with LateralFirewall, LateralDNS and LateralTime technologies simplify management and save you time and money, not least by reducing multiple single-function devices to just one multifunctional tool.

So…

If you have ever wondered whether anyone else is watching the feed from your video cameras…

If you suspect someone else is using your computer, either with or without you…

If you are concerned about your kids' tablet feeding malware to your work-at-home computer…

If you don't want your entertainment system entertaining itself at your expense...

If you suspect your virtual assistant is sharing more about you than you wish...

If you have ever run into your ISP's bandwidth restrictions and don't know how you could possibly be using that many Megs...

If you don’t want your kids sneaking on to the Internet after bed time…

... Let LAD take you back to before the Internet!