What is Archon ZV?

Read the most frequently asked questions we receive regarding our secure laptop for accessing classified material, Archon ZV.
3 min read

Powered by:

dell-technologies-titaniumpartner-logo-01 (1)

Mobile devices have evolved how we access information, but accessibility has come with a cost. The more we connect, the less secure we are. 

 

For government officials, military personnel, and other secure work environments, protection is critical. The Archon ZV provides a secure network, where information can be accessible virtually anywhere in the world, securely. 

 

If you’re considering the Archon ZV, there’s a chance you have some questions about security, how the device works, and how it can benefit your organization. Below, we’ve outlined a few of the most frequently asked questions we’ve received regarding Archon ZV.

In its purest form, what is ArchonZV, and what should it empower you to do?

 

The Archon ZV client is built on a high-performance Intel® Core™ vPro™ processor-powered laptop. ArchonZV is a purpose-built, end-user device for accessing classified material. It's mobile access, so you can do telework from your car. If you have a mobile hotspot, that can expand the places you can work. Archon ZV empowers you to access information wherever and whenever you need it, securely.

 

Who would benefit the most from having ArchonZV?

Anyone who needs to access classified information. This is especially helpful for those who would typically need a classified network. For lots of people, there is a restricted number of workstations to access the classified networks. Being able to spread out and access information from wherever provides flexibility in those work environments.

 

What are the biggest misconceptions about what ArchonZV is? 

The concept of a classified mobile device. The Archon ZV laptop does not need to be in a GSA safe when unused, when the device is powered off, it’s unclassified. Like any government device, you need to know where it is at all times, but a special storage facility is not needed. 

 

What makes Archon ZV different from other competitor solutions?

User experience: The laptop is easy to log into, and connect back to a classified network, securely. 

 

Internal retransmission device: Other solutions use external retransmissions, increasing the risk of the device being hacked. The internal feature forces users to go through an extra firewall (but is not an extra step for the user). We make it easier for users to comply with NSA security without them even thinking about it. 

 

How long does it take to set a customer up with Archon ZV?

We can provision 24-48 end-user devices in 15 minutes, compared to other solutions that can take hours for a single device. 

 

What does the learning curve for using Archon ZV look like?

Getting set up with Archon ZV is seamless. We will walk you through the process, provide you with your login to decrypt the laptop, and show you the interface of the IRD. You select your network, log in with your credentials, and you’re connected.

 

How do customers manage updates for Archon ZV?

Patches, updates, and new certificates can be managed over the air. You don’t have to come into the office to receive those updates. 

 

Is a network connection required to use the Archon ZV platform?

To access classified information, you must be able to connect to the dual VPN, meaning you need internet access. When attempting to access stored information offline, users will need to use Archon ZV Thick Client, our DAR laptop that uses dual layers of encryption. 

Can the Archon ZV platform be used anywhere in the world?

The Archon ZV platform from anywhere in the world. Although, some of our customers do have location requirements, which can be configured to a specific area or facility.  

 

What’s the difference between accessing the internet vs accessing the owned network?

A retransmission device is only necessary when connecting to the internet, whereas an internal retransmission device is recommended when going outside a certain network. 



Table Of Contents
Share this article

Get in touch.

Our team of experts has configured hundreds of solutions for organizations throughout the globe. Let us help you make security simple.