Product Basics

What is SecKonnect?
SecKonnect is a hardware-accelerated Zero Trust Network Access (ZTNA) edge device. It's a small, plug-and-play dongle that replaces traditional VPN clients. It establishes a hardware-rooted, mutually authenticated tunnel from the user's device directly to a pre-approved endpoint — no credentials, no software, no exposed ports.
Why "Secure. Simple. Seamless."?
Those three words capture our design philosophy. Security is hardware-rooted (not bolted on as software). Simplicity is plug-and-play (no agents, no installs). Seamlessness means users get the same experience whether they're at HQ, at home, or in a hotel.
What's in the box?
A SecKonnect ZTNA edge device, a USB-C cable, and a quick-start guide. Pilot programs include onboarding sessions with our solutions engineering team.
What operating systems does it support?
SecKonnect works on Windows, Linux, and iOS. Because it's agentless, there's nothing to install — the device handles authentication and tunneling itself.

Security & Architecture

How does SecKonnect eliminate credentials?
Each device's identity is bound to a hardware secure element. Mutual TLS (mTLS) is established using keys stored in tamper-resistant silicon — there is no username, no password, no shared secret for an attacker to phish, dump, or replay.
What encryption is used?
AES-256 for symmetric encryption, mTLS for the transport layer, and hardware-backed key storage. All cryptographic operations happen on the dongle, isolated from the host operating system.
How is this different from a VPN?
A VPN authenticates a user with credentials and then exposes the entire network. SecKonnect authenticates a hardware device with mTLS and exposes only the specific IP/port it was provisioned for. It's least-privilege by default — VPNs are most-privilege by default.
What if the device is lost or stolen?
An admin can revoke the device from the management panel with a single click. Active sessions terminate instantly, and the device cannot reconnect. Hardware-bound credentials cannot be extracted from the secure element.
Does it protect against zero-day exploits?
SecKonnect's architecture eliminates entire classes of attack surface — there are no exposed VPN gateways, no public concentrators, no client agents to exploit. Combined with device-bound identity, this delivers strong zero-day resilience compared to traditional VPNs.

Deployment & Operations

How long does deployment take?
A typical pilot for 25 – 50 users is operational within two weeks. Larger rollouts are phased: provisioning, policy setup, monitoring integration, and progressive cutover from existing VPN.
Do I need new infrastructure?
No new on-prem hardware is required. SecKonnect is delivered as devices plus a cloud admin panel. Most customers reduce infrastructure by retiring VPN concentrators and licenses.
Can I integrate with my existing identity provider?
Yes. SecKonnect's IAM layer integrates with most enterprise identity systems for role and time-based policies. Talk to our solutions team about your specific stack during a demo.
How does monitoring work?
Live session logs flow to the SecKonnect admin panel. You can view active sessions, drill into device identity, view access scope per session, and stream events to your existing SIEM.
Can I use SecKonnect for vendor or contractor access?
Yes — and it's one of the most popular use cases. Issue a SecKonnect device per vendor, scope it to exactly the IP/port they need, and revoke instantly when the engagement ends. No shared VPN credentials.

Compliance

Which compliance standards does SecKonnect support?
SecKonnect is designed against the control families of ISO/IEC 27001, SOC 2, GDPR, and NIST 800-171. Hardware key storage, end-to-end logging, role-based access, and time-bound sessions are all built in.
Will it help with audit evidence?
Yes. Every session is logged end-to-end with device identity, time, scope, and outcome. Auditors get the evidence trail they expect without extra tooling.
Where is data stored?
Session metadata is stored in geographic regions you select to support data residency obligations under GDPR and similar regulations. We never store your traffic content.

Pricing & Pilot

How is SecKonnect priced?
Pricing is a per-device subscription that bundles the hardware, admin panel, and updates. Volume discounts are available, and most customers see savings within the first year by retiring VPN infrastructure and licenses.
Do you offer a pilot?
Yes — typically a 30-day pilot scoped to a specific team or use case. Register an enquiry and we'll scope one with you.
What support is included?
All plans include email support and access to documentation. Enterprise plans add SLA-backed support, a named customer success contact, and security incident assistance. See our Service Level commitments for details.
What's the warranty on the hardware?
Devices ship with a 1-year manufacturer warranty. Replacement units are dispatched within 5 business days for verified defects.

Hardware Details

What are the hardware specifications?
Quad-core 64-bit CPU @ 1.6 GHz, 4 GB LPDDR4 RAM, Wi-Fi 6 (802.11 a/b/g/n/ac/ax), USB Type-C power (5V / 2A), passive cooling with dynamic voltage and frequency scaling.
Does it run hot?
No. The device uses passive cooling with DVFS, so it runs cool even under sustained load. There are no fans or moving parts.
Does it work over Wi-Fi or only Ethernet?
SecKonnect supports Wi-Fi 6 natively for upstream connectivity. The host-side connection is over USB-C.

Still have questions?

Our solutions team can usually answer specific technical questions within an hour. Drop us a note.