What is S-CATIN?

Secure Concurrent Access Terminal for Isolated Networks, this devices family (i20 and i22, j22) are based on the RahaCo’s production. (Patented, with Iran Code, with various technical and security approvals) that are suitable for companies that have the following concerns:

  • The challenge of information security for sensitive public and private organizations, to connect to two independent servers, one for non-internet intra-organizational work and one for internet connection

  • Organizational information concentration

  • Optimal use of hardware resources

  • Economic savings in purchases

  • Optimal use of bandwidth

  • More stability

  • Monitoring personnel performance and thus increasing productivity

  • Reduction of energy consumption (more than 95% in the consumption of computer systems)

  • Reducing installation and support costs (70% in a 6-year period)

-S-CATIN

S-CATIN network isolator capabilities

  • Compatible with all types of VDI protocols (PCoIP (VMware Horizon View), HDX, ICA), Remote fx and RDP, SPICE, DDP

  • The absence of any information on the user’s side (all the software and hardware need of the user are provided through the server and there is no information on the user’s side.)

  • The possibility of connecting 4 separate network ports with different ranges in different Wi-Fis and connecting the device to two or more different servers (pay attention to the figure below and click on it for more details)

  • Lack of possibility to exchange information between user environments (100% independent)

  • The possibility of disabling the entry and exit of information through the server by software and hardware

  • The ability to switch between two user environments without the need to log off or even disconnect in 2 seconds (possibility of continuing to use the previous environment)

  • Ability to activate or deactivate the USB ports of each environment separately

  • It has a floating USB port for connecting a mouse, keyboard, printer and accessories (by switching between user environments, these three ports are also switched.)

  • It has two separate series of ports for microphone and speaker for each user environment

  • No information is transmitted over the network except for differential image changes that are both compressed and encrypted with a proprietary protocol (DDP).

  • The ability to simultaneously monitor both user’s work environments without the user noticing.

  • The possibility of online and real-time monitoring of all users without imposing any additional traffic on the network

  • User behavior report

  • Indigenous and knowledge-based product

  • The possibility of changing and developing the features of the device for special conditions

  • The highest characteristics of information security according to the ISO27001:2005 information security management standard

  • The highest image quality and the ability to play FULL HD media even in both environments at the same time

  • The possibility of changing the quality of the user’s image from the server side and more optimal use of hardware resources

  • Ability to define user profile settings in the same way in both environments (Roaming Profile) or independent (Local Profile)

  • The ability to limit each of the user environments to a specific connection to a specific server

  • Permission to run only a series of special software

  • Ability to assign a specific operating system (virtual machine) to a user or a group of users or all users

  • The possibility of assigning different operating systems (winXP-7-8-10-Server 2008-server 2012-MPS2011-MPS2012/32&64 bit) to any number (up to 254) of users with Roaming Profile characteristic

  • The possibility of connecting each of the working environments to a wireless or wired network (even each of the working environments can be connected to both a cable network and a wireless network; that is, the device can be connected to 4 completely independent networks and 4 servers at the same time connected completely independently.)

ایزولاتور-scatin-i20
ایزالاتور-s-catin-i22

Comparison table of types of insulators

And now we address the point that; What is the difference between S-CATIN models? And we look at the difference between S-CATIN network isolators.

features isolator j22 isolator i20 isolator i22
manufactor country UK China China
warranty (year) 3 3 3
validity of purchase 8/10 9/10 9/10
particular features change in hardware and software according to the customer needs
disadvantages not having brocket
Hardware quality 8/10 8/10 8/10
dimension
DDP DDP DDP
PCoIP PCoIP
Citrix Citrix
RDP RDP
particular protocols 2X-Docker
Stability in use An average of 0.7 outages in an 8-hour period in office use Average 0.3 outages in an 8-hour period in office use Average 0.3 outages in an 8-hour period in office use
CPU 4*1.2GHz 4*1.2GHz 4*1.2GHz
Ram 2*1GB 2*1GB 2*1GB
internal memory
Ability to change hardware yes no no
Average network bandwidth usage
input Output USB2*8-2*VGA/HDMI-2*LAN-Bluetooth-WiFi USB2*8-2*VGA-2*LAN USB2*8-2*VGA-2*LAN-
-2*wifi
The number of possible users on one core/thread of the host CPU for office users 2.5 3.5 3.5
The number of possible users on one core/thread of CPU for professional users 2 2.5 2.5
The amount of RAM required for an office user 1 1 1
The amount of RAM required for a professional user 2 1.5 1.5
Full HD video playback * * *
HD video playback * * *
Compatibility with USB peripherals 8/10 9/10 9/10
Suitable for use under 10 people Due to special infrastructure, it is not economical Appropriate Appropriate
Suitable for use under 20 people Due to special infrastructure, it is not economical Appropriate Appropriate
Suitable for use under 20-30 people Appropriate Appropriate Appropriate
Suitable for use under 30-50 people Appropriate Appropriate Appropriate
Suitable for use more than 50 people Appropriate Appropriate Appropriate
price 13,000,000 15,000,000 17,000,000
Rate this page