Yoggie Security Systems was the developer of the world’s first hardware-based computer security solution. Yoggie’s range of security mini-computers connects to any PC or laptop at home, in the office and on the road using the USB port or ExpressCard slot – blocking Internet threats outside the host computer and boosting computer performance by off-loading installed security software. Yoggie’s products combine best of breed security software with proprietary patent-pending developments to provide the most comprehensive all-in-one security technology available to both consumers and corporate users.
Yoggie was created in 2005 by Shlomo Touboul and was sold to Cupp Computings on 2011.
Unlike security software installed on the laptop, the Yoggie Gatekeeper uses the same approach that is used to protect the corporate network – physical separation of the first line of defense. A robust security appliance, with a hardened Linux-based OS, Yoggie Gatekeeper physically isolates the laptop from incoming Internet threats. The fact that Yoggie Gatekeeper is in the front-line instead of the laptop itself means it can protect from unknown attacks, dropping the connection as they are identified. If for any reason, the attack is successful, Yoggie Gatekeeper is hit first and will not allow further damage to the laptop.
Hardware Designed for Security
Yoggie Gatekeeper’s hardware was designed specifically for security purposes only. It includes a robust computing platform with a powerful CPU, but with the sole purpose of protecting the laptop. Two separate network cards provide a physical separation between the unsafe zone (Internet) and the safe zone (connected to your laptop). The device also includes two separate Flash memory units. One unit stores a secured copy of the Linux OS. During pre boot, Yoggie copies the OS onto the second unit, and uses it during runtime. The original copy of the OS, stored on the first unit, does not include any “Write Access” permissions. This double step process, guarantees that in the event of a successful attack, upon rebooting the device a clean and safe version of the OS is uploaded, making the OS and security applications completely safe.