
KUB Console
Complete with 8-inch HD touch screen, the KUB Satellite comes with a mounting kit allowing it to be fixed on a wall, in a meeting room for example, or on the fixed elements of a ship or close to an operator.
The KUB Console perfectly and effortlessly integrates into any environment, any infrastructure, any cybersecurity ecosystems, and any user’s day– to–day activity. It doesn’t require programming or additional software installations – just plug it in, and you’re ready to go.
The KUB Console makes data security simple for everyone: employees, suppliers, clients, contractors, maintenance providers and visitors. It analyses and decontaminates USB devices in order to protect you, your data, your devices and your network from any and all USB infections, and resulting data breaches.
Simply connect your USB equipment to the KUB and it will perform an analysis in just a few minutes. Once the scan is complete, you can connect to your network secure in the knowledge that your USB device is safe and healthy.

KUB Totem
Complete with a 24-inch HD touch screen, customizable with your organization’s speech and colors, it is designed to be positioned at the entrance of a factory, a building or in a cafeteria. During the analysis, broadcast content intended to make users aware of cyber risks, health risks or safety risks of an industrial site.
During the analysis, broadcast content intended to make users aware of cyber risks, health risks or safety risks of an industrial site.
Simply connect your USB equipment to the KUB Totem and it will perform an analysis in just a few minutes. Once the scan is complete, you can connect to your network safe in the knowledge that your USB device is clean and healthy.
The KUB Totem analyses and decontaminates USB devices in order to protect you, your data, your devices and your network from all USB infections such as malware and ransomware and resulting data breaches.
Complete with HD touch screen, it perfectly and effortlessly integrates into any environment, any infrastructure, any cyber security ecosystems, and any user’s day– to–day activity. You don’t have to worry about programming or additional software installations – simply plug it in, and you’re ready to go.
