Operates offline
Purpose-built for air-gapped networks. No network interfaces, no telemetry, no dependencies on external services.
Offline, zero-persistence malware scanning and data inspection for removable media — purpose-built for air-gapped and sensitive environments.
Bifrost is a purpose-built scanning kiosk for removable media — USB drives, SD cards, portable hard drives — entering or leaving air-gapped and classified environments. It's a physical device that sits at the boundary: plug in a drive, get a malware and content report, and know what's on the media before it crosses the gap. The device retains nothing. Every scan is wiped from RAM on shutdown.
Purpose-built for air-gapped networks. No network interfaces, no telemetry, no dependencies on external services.
Runs entirely in RAM. Sanitised to ISM-0351/0352 on shutdown. Nothing survives a power cycle.
One system covers every classification level. Keyword sets and rule profiles adapt per session, from unclassified through to the highest caveats.
Signature engine and scanning rules delivered through a sealed image pipeline. Ongoing support built in.
A managed pipeline produces a sealed system image — OS, scanning engines, signature databases, and rule sets — written to hardware write-protected boot media.
Power on. The sealed image loads entirely into RAM in about thirty seconds. No persistent disk, no swap, no writable storage.
Connect removable media through the hardware write-blocker. Bifrost mounts it read-only and runs seven inspection phases automatically.
Results on screen and via thermal printer. Clean files, flagged files with reasons, items needing manual review — all in one report.
RAM is sanitised to ISM-0351/0352 before power-off. Every trace of the scan is wiped. The device is clean for the next operator.
Each scan runs through a fixed sequence of inspection phases. Every phase contributes to the final report.
Target media mounted read-only through the hardware write-blocker.
Every file catalogued — name, size, type, timestamps, cryptographic hash.
Files checked against a curated multi-engine malware signature database.
YARA-rule detection for malware families, techniques, and known-bad patterns.
Executables inspected for suspicious capabilities, packing, and embedded strings.
Content searched for classification markers and configurable keyword sets.
Findings aggregated into a single report — screen, print, or both.
Bifrost runs the same sealed image on both configurations. Choose the form factor that fits your environment — the scanning capability is identical.
Compact form factor for fixed installations. Sits on a desk or countertop at the checkpoint. Connects to an external display and write-blocker. Suited to entry points, guard stations, and classification control zones where the kiosk stays in one place.
All-in-one laptop configuration for field use, deployments, and environments where the kiosk needs to move. Built-in display and integrated write-blocker. Same sealed boot media, same scanning pipeline, same reports — just mobile.
Linux live ISO, non-persistent. RAM only, no disk writes. Hardware-enforced read-only at every layer — boot media, target media, root filesystem.
Boot media sealed and hardware write-protected. Target media through a hardware write-blocker. Chain of custody preserved throughout.
Assumes target media may contain active malware or weaponised payloads. Operator is trusted but not privileged. No data leaves the device.
ISM-0351 and ISM-0352 for RAM sanitisation. Air-gap enforcement by construction. Sealed, signed boot images through a managed pipeline.
Air-gapped by design. Updates delivered only through complete, sealed system images — never over the wire. No network-attached update path.
Third-party scanning engines are established open-source tools, independently auditable. Isolated via process boundaries for licence hygiene.
Built to ISM-0351/0352 for RAM sanitisation. Air-gapped by design. Nothing leaves the device.
Designed and built in Australia
Get in touch →We'll respond within two business days. For technical evaluation or procurement questions, include as much context as you can share.