BlackDog Project = Echo Identity Systems
There is no news and it looks like the bought the assets of Project Black Dog and turned it into an identity play by using the linux server as an identity server, and the built in biometrics as one of the factors for authentication. These guys may be fun to watch...
From their page:
The Echo iD3 Ultra-Mobile Server is a self-contained mobile computer that contains its own processor, memory, and storage. This allows the Echo iD3 to interact with the host PC as a peer or server instead of as a peripheral.
The Echo iD1200 Management Router extends data, applications, and services to enterprise end users via a secured computer like the Echo iD3, in a managed and secure fashion. Deployed at the edge of the enterprise network and easily integrated with existing IT infrastructure, the Echo iD1200 Management Router provisions applications and establishes authorization for Echo iD3 users.
Users employ a Echo iD3 Ultra-Mobile Server connected to any computer in any location to safely access the applications, resources, and data they need.
Administrators control thousands of iD3s from the iD1200 Management Router.
Financial concerns are alleviated with a drop-in system that significantly reduces IT support costs.
1. iD1200 Management Router. Activates Echo iD3 devices, updates software applications that run on the iD3 Ultra-Mobile Servers, and provides access to corporate applications and resources. Also instantly disables or deactivates Echo iD3 Ultra-Mobile Servers, immediately rendering them unable to access enterprise resources through the VPN tunnel.
2. The Administration Console. Used to access the iD1200 Administration web application.
3. (Optional) Application Servers. The servers with enterprise applications available to which the Echo iD3 connects. These application servers can be Citrix, RDP, Web, or other types.
4. (Optional) The LDAP Server. The server that provides directory services to the Echo iD1200 Management Router.
5. The Host Computer. Provides keyboard, mouse, monitor, and Internet connection for the connected iD3.
Together, the Echo iD3 Ultra-Mobile Server and the Echo iD1200 Management Router address what is likely the single biggest security issue facing enterprises today -- the use of unidirectional trust models. Users no longer have to navigate multiple layers of security, presenting credentials at each level. They are also completely confident they are accessing the proper enterprise resources. Administrators are likewise confident that only authenticated users can access backend resources. This bidirectional trust model is in place even while using untrusted resources such as PCs, even those compromised with malware.
1. The user connects the iD3 to the USB port of a host PC and authenticates on the iD3 using the built-in biometric scanner. When connected to the host PC, the iD3 uses the host's keyboard, mouse, monitor, and Internet connection to provide a familiar and rich user interface.
2. The iD3 and iD1200 work together to automatically establish a VPN connection, providing a secure, encrypted data tunnel.
3. While connected to the host PC, the iD3 user accesses all their applications, resources, and data - both local and remote. Access to these applications, resources, and data is controlled by the profile established on the iD1200 for the user. To help ensure security and maintain the integrity of the iD3 Ultra-Mobile Server and its association with the enterprise network, the iD3 user cannot download applications, files, or malware, even by accident.
4. As necessary, administrators automatically update iD3 applications and configurations and can instantly change or deny access to any or all enterprise resources.