ALL PRODUCTS

Welcome to our All product page. For our ready-made product packages, visit our Products page.

B2B: business to business

E2E encryption: End-to-end encryption

GSM: Global System for Mobile Communications

Haas: Hardware As A Service

Hardening computing: Making devices more safe & locked down

HW: Hardware

ICT: Information and Communications Technology

MMS: Multimedia Messaging Service

PGP: Pretty Good Privacy

RTC: Real-Time Communication (multimedia and audio via VoIP)

Saas: Software As A Service

SMS: Short Message Service

SW: Software

VoIP: Voice Over IP

VPN: Virtual Private network

Product Icon Description
Cybersec consultation Consultation Services Zen-mode's consultation service.
Cybersec + IT training Cybersecurity Training Hands on cybersecurity training. How to stay IT safe yet work efficiently.
Maintenance & Support Maintenance & Support Helping you maintain our solution + making sure that you are safe & secure.
Secure Network Meetings Secure VPN Host or join a secure network meeting from anywhere (hosted by us or your companies servers).
Secure VPN server Secure VPN Hide your real IP behind us (or your companies own VPN).
Secure Tor Bridge relay Zen-mode's Tor Bridge Relay Tor's unbeatable anonymity + Zen-mode's entry point to the system.
Secure + Anonymous Networking Zen-mode's Secure & Anonymous Networking Completely untraceable network surfing via Zen-mode's VPN + Zen-mode's Tor Bridge relays.
Secure Syncable Calendar Secure Calendar Secure syncable CalDAV calendar(s)
Secure Syncable Contacts Secure Contacts Secure syncable CalDAV Contacts(s)
Secure Storage Secure Storage Full disk encryption and/or filesystem encryption
Setup services Setup service Installation & configuration services of our solutions (on-site / remote).
Secure Mobile Secure Mobile Different Android models with re-install Open Android variant of choice + our tools.
Secure Laptop Secure Laptop Different laptop models from different vendors + Hardened Linux distribution.
Secure virtual RTC server Secure Virtual Server Hardened Linux distribution hosted in Zen-mode's secure cloud.
Secure RTC server Secure Server Different server models from different vendors + Hardened Linux distribution.
  1. Cybersec consultation  

  2. Consultation Services
      Zen-mode consultation service.

    Zen-mode Solutions cybersecurity / IT consultation service at your disposal.

    We have services ranging from mapping your cybersecurity needs / requirements, to helping out in older projects all the way to doing a complete project on our own. From designing a safe IT infrastructure on paper to implementing a whole project on your behalf (SW & HW).

    Products & Services Portfolio:
    • EU GDPR 2018 check
    • Cybersecurity health check
    • Cybersecurity Consultation
    • Continuous Integration & Test Automation Consultation
    • IoT Cybersecurity
    • Voice Encryption
    • Quick Message Encryption
    • Email Encryption
    • Secure Self-hosting Solutions
    • Secure & Self-hosting IT infra
    • Endpoint Security
    • Filesystem & HDD Encryption
    • Virtual Private Network
    • Cybersec Awareness +
      Training
    • Cybersecurity Forensics
    • Cybersecurity Risk Analysis
    • Intrusion Prevention Systems
    • Intrusion Detections Systems
    • Ethical Hacking
    • Testing & Probing

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Cybersec + IT training  

  2. Cybersecurity Training
      Zen-mode cybersecurity and IT training service.

    Defining the problem and our solution to it.

    Going from theory to applying out tools + OPSEC procedurs to your normal way of working. In short: getting the job done while keeping safe & secure.

    Topics:

    1. Defining the current IT privacy situation / problem
    2. Defining our solutions to the problem
    3. Defining what is meant by data leakage and how to avoid it (or at least minimize it).
    4. OPSEC (Operations SECurity), real life security 1-0-1
    5. What tools / networks are good, what to avoid
    6. What is SSL, RSA, PGP, VoiP, ZRTP, TwoFish, AES, Tor, OTR, XMPP etc
    7. What is a good password (passphrase)

    Hands on training of:

    1. Our Linux solution
    2. Our Open Android solution
    3. secure synced calendar
    4. secure VPN
    5. secure Tor Bridge
    6. Secure VoIP
    7. Secure PGP mail & secure data storage with PGP
    8. Zen Secure Message

    Putting it all togheter: Going from theory to secure IT business as usual.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Maintenance & support  

  2. Maintenance & Support
      Zen-mode's Maintenance & support

    This product guarantees that your Zen-mode systems stay up-to-date and safe & secure.

    • Maintenance can be on-site or remote depending on our deal + location of your hardware.
    • Basic maintenance deal: Support hours are between 08:00-16:00 (Note: Finnish timezone).
    • Platinum maintenance deal: Support hours are 24h x 7.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure Network Meetings  

  2. Secure Network Meetings
      Zen-mode's Secure Network Meetings (keeping things simple, secure & local)

    Your secure network meeting system @ your company which is completely under your control. All that you need is an up-to-date browser. No third party central server are involved.

    Features

    • SSL encrypted communication
    • Based on open WebRTC standard
    • Client requirement: Chromium + one plugin or Firefox browser
    • Inbuild Video, Sound and Screen-sharing
    • Unlimited participant amount
    • Host or join meetings (PIN protected) with a few clicks
    • No third party leakage: All data & connection are hosted by your company

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure VPN server  

  2. Secure VPN
      Zen-mode's fast & secure VPN solution

    Hide your real IP and network actions via using Zen-mode's fast & secure VPN. Your ISP / adversaries can only see that you have a secure connection to our VPN, after that your trail goes cold...

    NOTE: Be aware of IT-security sandcastles.

    A VPN is great way to help secure your network presence but is a VPN all that need to stay secure? No.

    For you to be as safe as possible your whole platform + tool chain should be verifiably safe (think: verified open source solutions). The more closed source or unverifiable tools you have, the more questionable you whole tool chain is. This is why we are Zen-mode only use open source solutions.

    Think: We can prove that out VPN connection is safe & secure but can you prove that your tools are not leaking information through our VPN? Be careful what devices & tools you use and trust.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure Tor Bridge relay  

  2.   Zen-mode's secure Tor Bridge relay

    Zen-mode's Tor Bridge relay

    Hide your true IP via using the Tor network + Zen-mode's Tor Bridge relay. Externals can at their best trace you back to Zen-mode's Tor Bridge relay, but no further.

    NOTE: With great power comes great responsibility.

    All criminal or illegal activity is prohibited and will automatically end our deal. For informaton, please see our Terms Of Service (TOS)

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure + Anonymous Networking  

  2. Zen-mode's Secure & Anonymous Networking
      Zen-mode secure VPN + Zen-mode secure Tor Bridge Relay

    Our most silent and most anonymous connection alternative is to combine our VPN solution + our Tor Bridge.

    Using Zen-mode's VPN and Zen-mode's Tor Bridge relay you can connect your own machines (what ever they may be) Securely & Anonymously to the Internet.

    When using our VPN all of your local network traffic appears to be coming from our VPN host (encrypted + multiple users behind same IP), then you enter the Tor network directly from our VPN host's Tor Bridge Relay.

    End result: A secure and anonymous network presence. We got your back.

    NOTE: With great power comes great responsibility.

    All criminal or illegal activity is prohibited and will automatically end our deal. For informaton, please see our Terms Of Service (TOS)

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure Syncable Calendar  

  2. Secure Calendar
      Zen-mode's Secure Calendar Service

    Imagine a private & secure syncable calendar in the CalDAV format. One calendar, many devices, all securely synchronized.

    You may also have group-calendars where all wanted members can add / remove / edit the calendar toghether.

    Want to securely send a calendar invitation to a customer / external ? No problem. Create calendar event + attach it to a PGP encrypted mail to person-X and send it on it's way. Zero data leakage.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure Syncable Contacts  

  2. Secure Contacts
      Zen-mode's Secure Syncable Contacts

    Imagine a private & secure syncable Contact database in the CalDAV format. One contacts setup, many devices, all securely synchronized.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Secure Storage  

  2. Secure Storage
      Zen-mode's Secure Storage

    All Zen-mode products ship with the highest open source filesystem encryption available, thus your data is verifiably safe with us (Mobile, Laptop, Server).

    1. Unless the user is able to provide your device password at boot (Full disk encryption or /data filesystem encryption), nothing will start. Your data is safe.
    2. Unless a user is able to login to your running systems (with your credentials), nothing will open. Your data is safe.

    The three rules on keeping your data safe:

    1. When you are not using your devices: Always keep them in a locked or shutdown - state and...
    2. Never unlock them for anybody expect for yourself.
    3. If you find yourself in a situation, shutdown everything.

    For more information give us a call or use our
    Secure Web Contact and we will call you back.

  1. Setup services  

  2. Setup service
      Installation & configuration services of our solutions (on-site / remote).
    1. Mobile
    2. Laptop
    3. RTC server
    When packaged together with Zen-mode's Mobile and/or Laptop offerings you get the complete package.

    For more information see our Combo, Mobile or Laptop packages.

  1. Secure Mobile  

  2. Secure Mobile

    Different HW vendors according to customers request (quality/price)

    • Picture a (open source) Android mobile which is totally under your control.
    • Normal GSM functionality.
    • As simple to use as a normal Android device.
    When packaged together with Zen-mode's other offerings you get the complete package:
    • E2E encrypted: VoIP calls, "MMS"-messages, emails and encrypted root filesystems etc.
    • Zen-mode's fast & secure VPN which hides your real IP (which can easily be turned on/off).
    • On top of that we can also anonymize your IP via our Zen-mode Tor Bidge relay. (VPN + Tor Relay)

    For more info see the the Mobile package.


  1. Secure Laptop  

  2. Secure Laptop
      Different HW vendors according to customers request (quality/price)
    • Picture your wanted laptop hardware + a hardened Linux which is totally under your control.
    • As simple to use as Windows etc.
    When packaged together with Zen-mode's other offerings you get the complete package:
    • E2E encrypted: VoIP calls, emails and encrypted root filesystems etc.
    • Zen-mode's fast & secure VPN which hides your real IP (which can easily be turned on/off).
    • On top of that we can also anonymize your IP via our Zen-mode Tor Bidge relay. (VPN + Tor Relay)

    For more info see the Laptop package.


  1. Secure virtual RTC (Real-Time Communication) server  

  2. Secure Virtual Server
      Secure virtual server according to customers specification (specification/price)
    • Picture hardened virtual server which is under your control & specification (hosted in Zen-mode's secure cloud).
    When packaged together with Zen-mode's Mobile and/or Laptop offerings you get the complete package.

    For more information see our Combo, Mobile or Laptop packages.


  1. Secure RTC (Real-Time Communication) server  

  2. Secure Server
      Different HW vendors according to customers request (quality/price)
    • Picture your wanted server hardware + a hardened Linux which is totally under your control.
    When packaged together with Zen-mode's Mobile and/or Laptop offerings you get the complete package.

    For more information see our Combo, Mobile or Laptop packages.


NEXT STEPS  

For more information / price list give us a call or use our Secure Web Contact and we will call you back.

For a quick intro what Zen-mode is all about visit our our Home page.

To learn more about the problem area and our solutions to it, visit our Solutions page.

Find your Zen