View Hardware

 


Traditional WAN and SD-WAN architectures often rely on vulnerable VPNs using IPsec tunnels and require proprietary, single-purpose hardware for deployment. As a next-generation alternative, Lanner has partnered with Dispersive to deliver an integrated solution that combines Dispersive’s Stealth Networking technology with Lanner’s versatile uCPE platforms. 

This software-defined, multi-path networking overlay enhances security, performance, and resilience by splitting data into multiple encrypted streams. Each stream travels a separate path, making the network virtually invisible and highly resistant to man-in-the-middle attacks—ensuring adversaries cannot detect the network or intercept the data being transmitted.

Dispersive Stealth Networking

Dispersive Stealth Networking is a next-generation Zero Trust Network Access (ZTNA) solution that transforms secure connectivity for modern applications, users, and data. Built on the principle “You can’t hack what you can’t see,” Dispersive eliminates attack surfaces, ensuring invisible, high-performance, and resilient connections across cloud, edge, and remote environments. 

Unlike traditional SD-WANs, VPNs, and firewalls, Dispersive dynamically splits and encrypts traffic across multiple secure paths—making it virtually impossible to intercept or disrupt. Designed for the most demanding environments, our cloud-native SaaS solution deploys in minutes with low-code/no-code orchestration, delivering unparalleled security and performance without complexity. 

 

Secure, Resilient, High Performance Zero Trust Network Platform 

Designed for the most demanding environments—where security, speed, and resilience are non-negotiable. 

 

 

 

Dynamic Multi-Path Stealth Networking 

 

Zero Trust, Beyond Perimeters 

 

Ultra-Secure, High-Performance Connectivity 

Splits and encrypts data across multiple unpredictable paths, making it nearly impossible for attackers to intercept or disrupt communications.    Enforces least privilege access and continuously verifies network integrity, eliminating single points of failure and stopping threats before they reach critical systems.    Delivers military-grade security without compromising speed, ensuring seamless, resilient operations across cloud, hybrid, and on-prem environments. 

 

  Use Cases

 

Benefits

  • Seamless Zero Trust Access – Securely connect users, devices, and workloads across hybrid and multi-cloud environments. 
  • Unbreakable Resilience – Self-healing, multi-path networking ensures uninterrupted operations—even in high-risk environments. 
  • Cost & Complexity Reduction – 25-40% lower total cost of ownership (TCO) with a simple, scalable, and adaptable solution. 
  • Performance at Scale – Up to 10X faster connectivity for AI workloads, remote access, and edge-to-cloud deployments. 

Featured Products

NCA-1040

NCA-1513

NCA-1515

NCA-1516

NCA-2512

NCA-1040_front NCA-1513_front NCA-1515_front4 NCA-1516_front7 NCA-2512_front9
  • Onboard Intel® Atom X6413E CPU (Codenamed Elkhart Lake)
  • DDR4 3200MHz, SODIMM, Max. 32GB
  • 4x 1GbE RJ45 (One Of Which Supports PoE+), 1x Console, 1x USB 3.0, 1x Display Port
  • Intel® Atom® C3000 Processor (Codenamed Denverton)
  • 6x or 4x GbE RJ45, or 4x GbE RJ45 + 2x SFP (by SKU)
  • DDR4 2133/1866MHz, Max. 32GB
  • 2~16 Core Intel® Atom® C3000 Processor (Denverton)
  • Max. 4x RJ45, 2x SFP & 2x RJ45(By SKU), with SR-IOV and DPDK support
  • 2x 260-pin DDR4 2400/2133/1866MHz ECC/Non-ECC SODIMM (by SKU), Max. 64GB/32GB (By SKU)
  • 4~16 Core Intel® Atom C3000 CPU
  • DDR4 1866/2133/2400 MHz, Max. 64GB
  • 6x 1GbE RJ45 (w/ 2x PoE+ Option), 2x 10G SFP+,with SR-IOV and DPDK support
  • Intel® Atom™ C3000 CPU 8 ~16 Cores (Codenamed Denverton)
  • 5x GbE RJ45, 4x 10G SFP+ (By SKU), 1x NIC Module Slot, 2x Pairs of Gen3 Bypass
  • 300W Redundant PSUs & 2x Cooling Fans

 

 Lanner Model 

Dispersive SKU# 

SPEED 

LTE 

SIM Slots 

WIFI 

Ethernet 

SFP 

PDU 

1040-SEB 

L-1040SEB-4C-8-128M-US 

100Mbs 

Optional 

Two 

 

Four - RJ45 

N/A 

One 

1040-SEB 

L-1040SEB-4C-8-128M-W2-US 

100Mbs 

Optional 

Two 

One Module (w/antennas) 

Four - RJ45 

N/A 

One 

1040-SEB 

L-1040SEB-4C-8-128M-C13-US 

100Mbs 

EM 7590 

Two 

Optional 

Four - RJ45 

N/A 

One 

1513E 

L-1513E-4CL-8E-128M-DH1 

100Mbs 

Optional 

One 

Optional 

Six - RJ45 

N/A 

One 

1515A 

L-1515A-8C-16E-128M-DH1 

1Gbs 

Optional 

Two 

Optional 

Six - RJ45 

N/A 

One 

1515A 

L-1515A-8C-16E-128M-2xW2 

1Gbs 

Optional 

Two 

Two Modules (w/antennas) 

Six - RJ45 

Two - i350-AM4) 

One 

1515B 

L-1515B-4C-16E-128M-C2-W2-US 

1Gbs 

EM 7455 

Two 

Dual Band 

Six - RJ45 

Two - i350-AM4) 

One 

1516A 

L-1516A-16C-64E-256M-A2-US 

1Gbs 

Optional 

Two 

Optional 

Six-RJ45 

Two-10GbE SFP+ 

Two 

2512A 

L-2512A-16C-64R-512-4XF-DH1 

10Gbs 

N/A 

N/A 

N/A 

Five-RJ45 

Four-10GbE SFP+ (expandable to 8) 

Two 

 

Ready to Deploy?

 

Request a Demo

 

 

View HardwareDownload PDF

 


 

Lanner has partnered with Safegate in Vietnam to provide comprehensive firewall solutions for enterprises, schools, factories, and hospitals. This collaboration integrates Lanner's desktop network security appliances with Safegate's SafeGate Office, delivering advanced security, AI-enhanced threat detection, and zero-touch provisioning for seamless, secure network protection across diverse industries.

 

SafeGate Office 

Firewall Solution for organization, businesses, schools, factories and hospitals.

 

 

 

Featured Products

NCA-1040

 

NCA-1515

 

NCA-2513

NCA-1040_front   NCA-1515_front4   NCA-2513_front
  • Onboard Intel® Atom X6413E CPU (Codenamed Elkhart Lake)
  • DDR4 3200MHz, SODIMM, Max. 32GB
  • 4x 1GbE RJ45 (One Of Which Supports PoE+), 1x Console, 1x USB 3.0, 1x Display Port
 
  • 2~16 Core Intel® Atom® C3000 Processor (Denverton)
  • Max. 4x RJ45, 2x SFP & 2x RJ45(By SKU), with SR-IOV and DPDK support
  • 2x 260-pin DDR4 2400/2133/1866MHz ECC/Non-ECC SODIMM (by SKU), Max. 64GB/32GB (By SKU)
 
  • Intel® 8-core Atom C3000 CPU (Codenamed Denverton-R)
  • Intel® QuickAssist Technology at 20G (By SKU)
  • Max. 64GB DDR4 2400MHz System Memory

 

View Hardware

 


 

In an era where cyber threats are continually evolving, robust and compliant cybersecurity solutions are imperative. In collaboration with Secure 2 Fiber, Lanner offers a comprehensive range of network appliances designed for tailored cybersecurity and powerful performance.

The dramatic increase in bandwidth usage, encrypted data traffic, video deployment and transmission speeds required an effective, cost-effective securing your networks. For these requirements, this AIMdefense Firewall is your ultimate solution – developed under German quality standards.

The AIMdefense Firewall portfolio secures digital infrastructures with up to 3000 workstations (depending on configuration). lt gives you transparency, protection and performance to master the security of your network with ease. Phishing, Malware, Ransomware and other unwanted traffic and attackers are analyzed, cleaned and blocked.

 

AIMdefense Next-Gen Firewalls

AIMdefense Next-Gen Firewalls are designed to empower you in mastering the security of your network effortlessly, providing cutting-edge solutions with unparalleled transparency, protection, and performance. Reliably detect and eliminate current and future cyberthreats before your IT infrastructure can be attacked. Whether for sole partnerships, small/medium-sized businesses, enterprises, or critical infrastructure, the AIMdefense firewall forms a protective wall around your data that you can trust.

Transparency
Gain insight into your network like never before. Our firewalls provide transparent visibility, allowing you to monitor and understand your network traffic with ease.

Protection
Stay one step ahead of cyber threats. AIMdefense NGFW analyze, clean, and block phishing attempts, malware, ransomware, and other unwanted traffic, ensuring your network remains secure at all times.

Performance
Don't compromise on speed. AIMdefense NGFW are engineered to deliver optimal performance, even in the face of increasing bandwidth usage, encrypted data traffic, and high-speed video deployment and transmission.

AIMdefense Packages and Modules
Various packages offer a wide range of application options that you can customise to suit your individual needs. Thanks to the variable terms, you can also react optimally to strategic changes.

 

 

Certified Network Appliances

NCA-1040

 

NCA-1515

 

NCA-4240

 

NCA-5310

NCA-1040_front   NCA-1515_front4   NCA-4240_front   NCA-5310_front
  • Onboard Intel® Atom X6413E CPU (Codenamed Elkhart Lake)
  • DDR4 3200MHz, SODIMM, Max. 32GB
  • 4x 1GbE RJ45 (One Of Which Supports PoE+), 1x Console, 1x USB 3.0, 1x Display Port
 
  • 2~16 Core Intel® Atom® C3000 Processor (Denverton)
  • Max. 4x RJ45, 2x SFP & 2x RJ45(By SKU), with SR-IOV and DPDK support
  • 2x 260-pin DDR4 2400/2133/1866MHz ECC/Non-ECC SODIMM (by SKU), Max. 64GB/32GB (By SKU)
 
  • Intel® 14th Gen Core™ i9/i7/i5/i3, Pentium® Or Celeron® Processor With H610E/Q670E Chipset (Codenamed Alder Lake S/Raptor Lake S/Raptor Lake Refresh)
  • 1x GbE RJ45, 8x 2.5GbE RJ45, 1x NIC Module
  • 3x Pairs Of Gen 3 SE LAN Bypass
 
  • AMD 3rd Gen EPYC Processor Family (Codenamed Milan)
  • 8x 288-pin DIMM, Max. 512GB DDR4 3200MHz ECC R-DIMM
  • Support PCIe 4.0 (Rome) for Improved I/O Performance

 

View Hardware

 


Advanced
Threat Detection
Integrated
Security
Optimized
Performance
Tailored
for Linux
TailorMulti-Stage Attack Defenseed for Linux

 

Securing Linux systems on constrained hardware presents significant challenges due to processing power, memory, and storage limitations. Due to their limited resources, constrained hardware environments, such as embedded industrial gateways & AI-enabled edge computing and xCPE, are particularly susceptible to security breaches. Traditional security measures may not be feasible or effective in these contexts, leaving devices vulnerable to cyber threats. The lack of robust security mechanisms tailored to constrained hardware increases the risk of unauthorized access, data breaches, and exploitation of vulnerabilities. Additionally, communication between these devices and networks is often prone to interception and manipulation.

Addressing these security challenges requires innovative solutions that leverage AI-driven cybersecurity approaches tailored for Linux computing environments. Lanner collaborates with AI EdgeLabs to offer an AI-powered cybersecurity solution to monitor and stop cyber attacks in constrained computing environments. By combining Network Detection and Response (NDR), Endpoint Detection and Response (EDR), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and container security, this solution mitigates security risks and safeguards Linux systems effectively.

 

 

AI EdgeLabs

AI EdgeLabs offers a comprehensive cybersecurity solution tailored for Linux systems. It provides robust Network Detection and Response (NDR), Endpoint Detection and Response (EDR), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), and container security functionalities. Leveraging AI-driven cybersecurity capabilities, AI EdgeLabs empowers organizations to proactively protect their Linux systems, mitigate security risks, and maintain a resilient security posture in dynamic edge computing environments.

Capabilities

1.    Advanced Threat Detection
AI-powered algorithms continuously monitor network traffic, endpoints, and containers to detect and respond to evolving threats swiftly.

2.    Integrated Security
The platform combines NDR, EDR, IDS, and IPS capabilities in a lightweight container, ensuring a seamless and comprehensive security posture.

3.    Optimized Performance
AI EdgeLabs is optimized for advanced edge security, enhancing performance, productivity, and runtime cost efficiency.

4.    Multi-Stage Attack Defense
The EDR solution effectively defends against multi-stage attacks, safeguarding Linux-based systems against sophisticated threats.

5.    Tailored for Linux
Specifically designed for Linux environments, ensuring compatibility, seamless integration, and optimized security for Linux-based systems.

 

AI Assistant Integration

AI EdgeLabs now includes an AI Assistant to help analysts quickly identify and rationalize security incidents. This assistant makes recommendations for remediation and includes a built-in playbook generator, enhancing the efficiency and effectiveness of incident response.

Implementing AI EdgeLabs NDR, EDR, IDS&IPS on Lanner's carrier-grade security appliances to enhance threat detection and response capabilities in telecommunications infrastructure.
 
Utilizing AI EdgeLabs NDR, EDR, IDS&IPS on Lanner's industrial IoT gateways and platforms to safeguard critical industrial systems and processes from cyberattacks.

Integrating AI EdgeLabs software agents with Lanner's high-performance network security appliances to provide comprehensive protection for data-center storage & transport. 
 

Deploying AI EdgeLabs on Lanner's rugged security gateway deployed in smart city environments to detect and mitigate cyber-threats targeting critical infrastructure, such as transportation systems and utilities.
 

Featured Products

LEC-7242

 

EAI-I131

 

ICS-I370

LEC-7242

  EAI-I131   ICS-I370
  • Intel® Apollo Lake CPU
  • Onboard LPDDR4 Up to 8GB
  • 2x GbE RJ45, 1x RS232/422/485 COM Port
 
  • NVIDIA® Jetson Orin NX/Nano
  • AI Performance Up To 100 TOPS
  • Up To 1024-core NVIDIA CUDA GPU With 32 Tensor Cores
 
  • Industrial Grade Cyber Security Platform
  • Intel® Atom™ x7-E3950/x5-E3940 (Apollo Lake)
  • 8x, 6x or 4x GbE RJ45 ports with 1 or 2 pairs Bypass, SKU C,D,F with 2x GbE SFP

Ready to Deploy?

 

Request a Demo

 

Rapid urbanization requires significant improvements to public transportation. Modern public transit systems have a focus on safety while keeping people on schedule. This means public transit agencies need to develop and maintain efficient operations and processes to provide a satisfying secure experience for passengers. Public transit agencies need a fast-acting solution that can centrally monitor, control and report status, incidents, and emergencies to the proper authorities along with any gathered data and video feeds.

Intelligent video surveillance is forecasted to grow with continuous momentum, triggered by the rising demands for public security and safety. Intelligent Surveillance Systems, consisted of a network of in-vehicle computers, cameras and video management systems, are usually installed in moving vehicles for activity monitoring and video streaming, which facilitates crowd management and crime prevention and, when necessary, enables prompt response.