All aspects of your CryptoRouter enabled network are managed via our cloud based control panel. We taken a profile driven approach, allowing you to configure the key parameters of your networks once, and then deploy an unlimited number of sites using those same profiles.
Click here for more information about how we securely and reliably operate our cloud infrastructure.
The entirety of the CryptoRouter platform has been designed from the ground up to provide the perfect set of network features and functions for cryptocurrency mining network operators. Whether you want to employ only the basic networking functionality and provide secure, high speed connectivity for your miners, or you wish to make use of our advanced auto-discovery, auto-provisioning, and real-time monitoring capabilities, CryptoRouter is the right choice for your network.
CryptoRouter provides users with the ability to protect their account using TOTP based multi-factor authentication, and provides administrators with the ability to require the use of this feature by their users, just as you would expect of a modern web application.
For most organizations, that's entirely sufficient. But, if you wish to protect against even the most targeted attacks by persistent threat actors, CryptoRouter offers an additional layer, which we call High Security Authentication. Your users will login using their standard, multi-factor credentials, but also be required to authenticate using a physical, securely issued hardware token.
Click here for more information on High Security Authentication
With CryptoRouter's profile driven approach to network and operational configuration, setting up new networks and the devices connected thereto "just happens." Configure your standard settings for your network and your miners once, and newly deployed equipment is configured automatically. Any issues detected during the setup and provisioning process are automatically detected, and your personnel alerted as to the nature of the problem, and in some cases, suggestions for resolution.
Click here for more information on the CryptoRouter profile system
CryptoRouter provides the only platform you need to both operate your mine network, and host the systems and applications that you need to support your operation. We have pre-built images to allow you to easily deploy the Foreman mining management platform, or you can deploy a base operating system and install whatever applications you need.
Click here for more information on the CryptoRouter virtualization platform
The development of highly secure firewall rules does not need to be a burdensome task. CryptoRouter provides a highly secure enviroment out of the box, isolating the various segments of your network, restricting management traffic to authorized sources, and blocking outbound unauthorized outbound traffic.
Click here for more information on the CryptoRouter virtualization platform
The development of highly secure firewall rules does not need to be a burdensome task. CryptoRouter provides a highly secure enviroment out of the box, isolating the various segments of your network, restricting management traffic to authorized sources, and blocking outbound unauthorized outbound traffic.
Click here for more information on the CryptoRouter Time-Delay and Multi-Party Authentication system