ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
GreenTec-USA Logo

GreenTec-USA

Our advanced patented AI algorithms, coupled with NIST and Government approved data integrity provides protection for systems & data from cyber-attacks. Our focus is to significantly reduce cost, size, weight and power (SWaP) with innovative solutions like ForceField Write-Once File System (WFS), WORMdisks, CYBERdisks, XTC-2200 Video Compressor and modular re-configurable, high-performance data center and mobile Processor and Storage Blocks for edge node processing and storage. Provides the ability to deliver ORIGINAL DIGITAL DATA when needed for records retention or digital evidence in court. GreenTec’s Zero Trust Storage™ is the secure storage used for the National Institute of Standards and Technologies (NIST) SP 1800-25 and SP 1800-11 for “Data Integrity projects for Protection and recovery from Ransomware and other destructive Events. Our patented technologies operate independently of the operating system and cannot be bypassed regardless of access credentials used.

Quick overview

Founded in 2005

11-50 Employees

Additional information

Working industry

Other

Type of company

Manufacturer, Service provider

Number of products

12 Products

Number of services

1 Service

Specialised areas

Cloud Data Services, Data Center, Enterprise Software

Products & services of GreenTec-USA

GreenTec-USA offers a wide range of products and services

Product: Services | Cyber-Defense-and-Data-Integrity

Service

Services | Cyber-Defense-and-Data-Integrity

Go to product >

Product: Products | Cyber-Defense-and-Data-Integrity

Product

Products | Cyber-Defense-and-Data-Integrity

Go to product >

Product: NIST Technologies for Data Integrity, Data Confidentiality & Ransomware Protection | Cyber-Defense-and-Data-Integrity

Product

NIST Technologies for Data Integrity, Data Confidentiality & Ransomware Protection | Cyber-Defense-and-Data-Integrity

Go to product >

Product: ForceField™ ZT Storage | Cyber-Defense-and-Data-Integrity

Product

ForceField™ ZT Storage | Cyber-Defense-and-Data-Integrity

Go to product >

Product: ForceField™ SOHO Web Server | Cyber-Defense-and-Data-Integrity

Product

ForceField™ SOHO Web Server | Cyber-Defense-and-Data-Integrity

Go to product >

Product: GreenTec-USA Solution Would Prevent Sony Attacks and  Ransomware | Cyber-Defense-and-Data-Integrity

Product

GreenTec-USA Solution Would Prevent Sony Attacks and Ransomware | Cyber-Defense-and-Data-Integrity

Go to product >

Product: Secure Your World with Zero Trust Storage™ Technologies  & Devices | Cyber-Defense-and-Data-Integrity

Product

Secure Your World with Zero Trust Storage™ Technologies & Devices | Cyber-Defense-and-Data-Integrity

Go to product >

Product: WORMdisk™ ZT Storage | Cyber-Defense-and-Data-Integrity

Product

WORMdisk™ ZT Storage | Cyber-Defense-and-Data-Integrity

Go to product >

Frequently asked questions (FAQ) about GreenTec-USA

Some frequent questions that have been asked about GreenTec-USA

As of the latest available information GreenTec-USA has around 11-50 employees worldwide.

GreenTec-USA was founded in 2005

The company GreenTec-USA has it's main focus in the industries of Other

Competitors of GreenTec-USA

Check out some interesting alternative companies to GreenTec-USA

NexiTech's Logo

NexiTech

Woodland Park, United States

1-10 Employees

1995

NexiTech provides you with the data storage and cyber security expertise you need to be ready and stay ready. NexiTech specialties include Storage Area Network architecture, storage-related Windows and Linux device drivers, real-time embedded systems firmware and active cyber defense techniques for securing data storage devices. NexiTech specializes in cutting-edge storage networking solutions and advanced cyber security techniques for actively defending our nation against cyber threats to critical data storage resources. Our products have been deployed in military aircraft mission planning environments for the purpose of solving data storage obsolescence and cyber security issues. NexiTech works with both private-sector companies and public-sector government agencies to solve complex issues related to data storage and cyber security. The modular Virtual Tape Array from NexiTech uses innovative storage virtualization techniques and may be customized to emulate other devices, not just tape. It is a form of software-defined storage that integrates the latest hardware and software technologies into a purpose-built storage appliance. In 2017, the Department of Homeland Security selected NexiTech’s patented Moving Target Defense solution for funding under its Silicon Valley Innovation Program.

Blueskytec America's Logo

Blueskytec America

Charlotte, United States

1-10 Employees

-

Blueskytec aims to work with customers on a business–to-business basis providing cutting edge expertise in hardware, software and security. Quite simply, Blueskytec offers immutable hardware to protect your assets to SL4+ from all cyber attacks, with a fit and forget for 25 years. The Blueskytec hardware is 100% immutable with advanced Anti-tamper, Data At Rest and Data in Transit protection. The blueskytec devices are fitted as a “bump in the wire” in a multi-to-multi relationship, for the entire life cycle of your product (25 years) in extreme environments including space, reactor rooms and underwater marine environments, with NO maintenance or update cycles required. Blueskytec hardware uses FPGA that is TUV IEC 61508 SIL 3 certified. Blueskytec hardware is designed to exceed TUV IEC 62443 SL4. Blueskytec hardware is designed and undergoing PBA CRST certification. We can help you stay ahead of the cyber criminals and regulatory authorities and deliver bottom line growth for the business.

Racktop Systems's Logo

Racktop Systems

Fulton, United States

11-50 Employees

2010

Intelligence Community veterans, RackTop’s best-in-class BrickStor security solution follows an innovative Zero Trust model that empowers the public and private sector to safeguard their data from the escalating presence of ransomware and insider threats. The foundation of RackTop’s mission is built on leading an industry-wide shift from outdated legacy mindsets of the 1990s to an innovative and effective blueprint that exemplifies the future of cybersecurity. Learn more about how a hospice provider leverages BrickStor SP to safeguard unstructured data assets from cybercrime and accidental loss. Learn why an insurance provider chose RackTop’s solution to improve data security, recoverability, and compliance to more effectively manage and monitor multiple storage platforms. Learn more why an electric utility provider chose RackTop’s BrickStor Security Platform to provide real-time visibility and cyber resilience for their organization. Cyberstorage provides active defense and recovery against cyberattacks on storage systems and their data.”.

Acronis SCS's Logo

Acronis SCS

Scottsdale, United States

11-50 Employees

2018

Secure, Trusted Help With a 95% Satisfaction Rate. Reinforcing this vulnerability is a misunderstanding across the federal landscape about the appropriate tools required for protecting the edge, as demonstrated in survey findings. As such, we have designed a tailored, tested, and trusted backup software purpose-built for sensitive environments like those within the DoD and civilian agencies. Plus, this software includes built-in, AI-based protection against ransomware, called Active Protection. A comprehensive suite of data sharing products equips you with the tools you need to securely, efficiently, and affordably access, share, sync, and store files at the edge – all critical tasks for timely decision-making and employee productivity. At Acronis SCS, we strive to provide unparalleled support, ensuring your satisfaction with our security solutions every step of the way.

iStorage Limited's Logo

iStorage Limited

London, United Kingdom

11-50 Employees

2009

A recognised market leader, iStorage products incorporate a secure microprocessor that is Common Criteria EAL 5+ (Hardware Certified) whilst also meeting government certifications such as FIPS 140-2 Level 2/3, NCSC CPA, NLNCSA BSPA/Dep-V and NATO. Over the years, iStorage has adapted from being a hardware-only company to offering both hardware and SaaS, such as the cloudAshur KeyWriter and Remote Management Console for cloudAshur and datAshur BT. In so doing, we offer, not only hardware drives for end-users, but also allow their IT departments to manage and control all of the devices that are used within their infrastructure. Having a team of people with the knowledge, experience and passion to deliver such solutions helps iStorage to continuously expand and innovate. In the event that an iStorage product is lost or stolen, our customers have peace of mind knowing the loss is limited to a piece of affordable hardware. Using military specified encryption levels, we ensure that all users of iStorage products are fully protected against data leakage, helping our customers comply to data protection and confidentiality laws. It’s not just something we do, it’s who we are, and it guides us in everything we do. Our diskAshur PRO² was awarded Security Product of the Year at the PC PRO Magazine Awards.

Goldilock's Logo

Goldilock

London, United Kingdom

11-50 Employees

2017

We at Goldilock come from a generation where you locked the office at night and didn't worry about anything until the next morning. We originally devised Goldilock to help deal with the conflict between hot and cold crypto wallets (still a use case), but we gradually came to understand that we solve many more problems in many more verticals - from isolation and protection of Operational Technologies, to securing disconnected backups for Mom&Pop Shops and Multinationals to help mitigate ransomware attacks. Goldilock Drawbridge offers an innovative cybersecurity solution, allowing for the physical segmentation of digital assets and networks remotely, without internet dependence (complete non-IP remote control - no IPv6, no IPv4, no VPN's which means no packets to sniff, and nothing to find on a network)Our patented technology ensures assets remain secure, invisible, and inaccessible to adversaries, connecting to the internet only when necessary or being isolated securely and physically in an instant. Goldilock provides an added, bulletproof layer of security by allowing users to physically disconnect their assets from any network, either proactively or reactively. Goldilock's patented platform allows users to remotely, securely and easily physically connect or disconnect assets from any network without sending commands over the internet. Goldilock also offers professional services for smooth customer deployment, such as network configuration assistance, the creation of support models, naming conventions, and secure command processes. Get in touch with our experts today and experience the power of instant, remote, non-ip, physical disconnection for ultimate protection. Our 4, 8 and 12-port network appliances are remotely controlled and provide full physical network isolation using out-of-band, non-IP based commands.