SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL



Similar documents
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

INFRASTRUCTURE CONTROL SYSTEMS ENCRYPTION

data Centres solutions-paper

THE DATA PROTECTION COMPANY HIGH EFFICIENCY SWITCHABLE CERTIFIED ENCRYPTION UP TO 10 GBPS CN6000 SERIES

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

Big Data solutions-paper

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

High Speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network?

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NETWORK SECURITY.

Business Continuity and Disaster Recovery Solutions in Government

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

The role of encryption in securing data centre connectivity

How To Secure My Data

Virtual Privacy vs. Real Security

High Speed Encryption Made in Germany

SureDrop Secure collaboration. Without compromise.

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

BLACK BOX. EncrypTight

Best practices for protecting network data

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

NOS for Network Support (903)

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Data Center Interconnect

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

USER-MANAGED FILE SERVER BACKUP:

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

How To Protect Your Data From Harm With Safenet

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

TrustWay: the high security solution

Building A Secure Microsoft Exchange Continuity Appliance

The Education Fellowship Finance Centralisation IT Security Strategy

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

White paper. Why Encrypt? Securing without compromising communications

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

Layer 2 Encryption Fortifying data transport

How To Protect Your Data From Being Hacked

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Network Enabled Cloud

Technical papers Virtual private networks

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Partner with the UK s leading. Managed Security Service Provider

Western Australian Auditor General s Report. Information Systems Audit Report

Protecting Your Data On The Network, Cloud And Virtual Servers

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CYBER SECURITY: NAVIGATING THE THREAT LANDSCAPE

Adobe Systems Software Ireland Ltd

WhitePaper. Private Cloud Computing Essentials

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

PRODUCTS & TECHNOLOGY

CAPABILITY STATEMENT

Cloud Computing in a Government Context

the about MPLS security

Block based, file-based, combination. Component based, solution based

1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Charter Business Fiber Solutions. Crucial for anything that s mission critical.

E-Guide. Sponsored By:

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

WAN and VPN Solutions:

Cloud Backup and Recovery for Endpoint Devices

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup

Preparing Your IP Network for High Definition Video Conferencing

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

An illustration of a company transforming to complete data security in 15 minutes

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

A practical guide to IT security

Vocus Layer 2 Ethernet Services

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

THE VX 9000: THE WORLD S FIRST SCALABLE, VIRTUALIZED WLAN CONTROLLER BRINGS A NEW LEVEL OF SCALABILITY, COST-EFFICIENCY AND RELIABILITY TO THE WLAN

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

SCHEDULE 1 SERVICE DESCRIPTION

Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V3 Page 1 of 15

ethernet services for multi-site connectivity security, performance, ip transparency

Voice and Data Convergence

Transcription:

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

Senetas certified hardware encryptors are trusted by market leading commercial and industrial organisations around the world to protect sensitive network transmitted data. Our carrier-grade network data encryptors are specialist hardware products, dedicated to protect sensitive information while being transmitted across data networks - without the high costs of compromising high-speed network performance. SENETAS COMMERCIAL & INDUSTRIAL CUSTOMERS Of course, as a trusted information security company we cannot disclose our customers. But we can tell you about the types of market leaders that choose Senetas certified hardware encryptors to protect their business secrets, they customers privacy, their intellectual property (IP) and protect their own brand reputation. Our commercial and industrial customers often adopt technologies requiring increasing network data transmission and risks of exposing confidential information to cyber-crime: > > Banking and financial services, including: Banks Financial transactions services > > Cloud and datacentre service providers, including Global application services Remote datacentre services for back-up and disaster recovery Private Cloud and datacentre services > > Professional service providers, such as: International and national professional services > > Law firms > > Accounting firms Health providers > > Other commercial and industrial organisations, with mission critical needs: IP sensitive operations Industrial control systems CCTV network asset protection Customer privacy B2B and B2C YOUR PRODUCT CERTIFICATION ASSURANCE Senetas customers benefit from Senetas s unique product certifications. The rigorous evaluation and testing standards of independent international testing authorities, provide important assurance that Senetas encryptors deliver their promised mission-critical high-speed encryption security performance. Senetas is the world s only manufacturer with products of this type that hold all three major certifications: > > FIPS (Federal Information Processing Standard) 140-2 Level 3. > > Common Criteria EAL2+, EAL4+. > > CAPS Baseline > > NATO - (in process). 2

Senetas certified hardware encryptors were initially developed for and continue to meet the strictest requirements of government agencies and defence forces. Senetas hardware encryptors provide commercial and industrial organisations the peace of mind that their brand reputations are protected by the multiple independent, international testing authorities certifications. In the event of a network breach, Senetas encryptors ensure the attackers only obtain meaningless bits and bytes. MAXIMUM DATA PROTECTION WITHOUT NETWORK COMPROMISE Recognised as leading encryptors of their type, Senetas encryptors are used by some of the world s most secure commercial and industrial organisations. Many transmit highly sensitive IP, financial transactions and customer identity information. They recognise that this sensitive information is exposed to cyber-crime risks from the adoption of new technologies, including: > > Cloud computing > > Big Data > > Datacentres > > CCTV networks. Senetas encryptors protect business information from network breaches cyber-crime and attacks: > > Eavesdropping > > Data theft > > Input of rogue data > > Innocent human and technical errors. While many encryption solutions are exposed to the risks of open systems vulnerabilities as well as the expensive costs of more than a 50% reduction in high-speed network performance, Senetas encryption solutions are not. Senetas s leading closed systems together with the assurance of multiple independent, international testing authorities performance certifications are important reasons why Senetas certified encryptors protect much of the world s most sensitive data and are the first choice of market leaders and governments in more than 25 countries. Senetas certified encryptors provide the critical last line of defence. They ensure that unauthorised parties who successfully breach a network only obtain meaningless rubbish. They also overcome security and performance weaknesses of other security products: > > Significant loss of data network performance up to 50% to 70% lost performance > > Exposure to technology vulnerabilities. 3

Our customers transmit sensitive data across a wide range of data networks from complex global multipoint meshed networks to simple branch point-to-point networks. All Senetas encryptors are fully interoperable, with the same trusted assurance and set and forget simplicity. The range starts with entry-level encryptors designed for more modest requirements 10Mbps to 1Gbps desk-top encryptors. The carrier-grade range of Senetas encryptors meets more demanding requirements - 1Gbps to 10Gbps rack-mounted encryptors. The benefits of Senetas encryptors certifications are continuous because the certifications involve thorough on-going processes of performance evaluations. Any change to Senetas encryptors also involves certification authorities evaluations. This is a performance standard unmatched by any other manufacturer! And Senetas encryptors best network data protection need not come at the heavy cost of reduced network performance. They enable maximum data network performance through their designed-in: > > Near zero-latency > > Zero-overhead > > Zero network impact on the network and on all network assets. They are also as simple to install and manage as set and forget. NETWORK BREACHES RISKS OF CATASTROPHIC DAMAGE Serious government data network breaches include: > > Data sniffing, eavesdropping and theft > > Citizen privacy breaches > > Redirection of data > > Cyber-attacks and damage to data integrity > > Human errors and systems and hardware failures e.g. incorrect network configuration > > Input of damaging rogue data New technologies delivering efficiencies to government organisations transmit large volumes of data that make even small network breaches potentially catastrophic: > > Loss of trust and reputation > > Financial losses and compensation costs > > Theft of government secrets > > Breach of privacy and identity theft > > Damage to data integrity and critical infrastructure and assets. LOW TOTAL COST OF OWNERSHIP Senetas encryptors provide low total cost of ownership in addition to their best data security: > > No loss of expensive high-speed network performance bandwidth savings of 50% to 70% > > Set and forget simplicity minimising on-going IT encryption management costs > > No business disruption costs 99.999% dependability and built-in redundancies > > Near zero implementation costs > > Total interoperability among all Senetas CN encryptors > > Minimal environment costs energy and rack storage efficiencies 4

Whatever your network data security needs, a Senetas certified hardware encryption solution will provide best practice security. The range of Senetas entry-level and carrier-grade encryptors, together with their 100% interoperable features enable the flexibility to meet a complete range of requirements. Our encryptors are used to meet a broad range of network data security requirements, including: > > Simple point-to-point location solutions > > Hub-and-spoke centralised multi-location solutions > > Complex multi-point to multi-point location solutions > > Encrypt-all policy solutions a mix of carrier-grade and entry-level encryptors > > SANS security solutions - network storage, servers and network infrastructure for datacentres. SENETAS HIGH-SPEED ENCRYPTORS Senetas encryptors are designed to meet the broadest commercial and industrial customer network data protection needs. These include modest bandwidth point-to-point networks and speeds; all the way to the highest speed and bandwidth requirements and complex meshed, multipoint network architectures. From entry-level 10Mbps to 1Gbps certified desktop encryptors The Senetas CN4010 entry-level ultra-compact desktop high-speed encryptor 10Mbps to 1Gbps. to carrier-grade 1Gbps to 10Gbps rack-mounted certified encryptors; Senetas encryptors provide flexible high-speed network solutions. Whether the requirement is to protect simple point-to-point branch office transmitted data; or high volume complex multi-point meshed network transmitted data; there are fully interoperable certified encryptors to cost-effectively meet government requirements. The fully featured Senetas CN61000 carrier-grade 10Gbps rack-mounted encryptor. 5

WHY ENCRYPT SENSITIVE NETWORK DATA? Data network breaches highlight the importance of protecting the data itself. Certified encryption hardware dedicated to data security is the ultimate data protection. Cloud, data centre, big data and other technologies need the best data protection and maximum network performance. The need to protect government organisations sensitive information within their systems is clear. But, the need to protect transmitted network data has not been so obvious. Leading data security organisations highlight that many organisations do not sufficiently protect network data once outside their direct control. Who really knows what happens to their data while transmitted to another location? Network data is easily and cheaply monitored, tapped, stolen, tampered with and redirected by cyber-criminals. In its 2012 Global Data Security Report, awarded information security experts Trustwave noted that 62.5% of data theft occurred while in transit. It also pointed to increasing cyber-criminal focus on data in transit. Furthermore, data travelling through networks is not just exposed to risks of cyber-attack; there are also genuine risks of transmission to wrong locations. Human error and technical equipment failings are real risks that can manifest more often than you would think. The common issue that organisations face is a breach of data privacy and/or integrity as well as criminal damage such as the loss of valuable intellectual property, whatever the original cause. However, these risks can be eliminated - and security assured - by automatically encrypting the data while it s in motion. Your network data commercial, government or industrial data, voice, video, or all three should be encrypted to protect your organisation and its stakeholders. Importantly, data security advisors highlight that almost all network data should be encrypted. They argue that in large volumes, even low value data, when aggregated, can be useful to cybercriminals and any network breach has potential to be harmful to reputations and stakeholders trust. In the past, data encryption came at a huge cost of network performance due to latency and encryption overheads. Senetas then developed zero-latency encryptors with zero overhead and impact on network assets maximum network performance and maximum data protection. Two serious network breach issues have been identified by data security analysts the seemingly harmless breach today may be very harmful in the future; and that most breaches remain undetected in the long-term. Australian manufacturer, Codan Ltd., only became aware of an earlier network breach when it discovered the theft of its products intellectual property, which had led to a massive decline in market share due to counterfeiting reported to it by its dealers years later. It s often assumed that data networks are safe. The reality is they are not. Cyber-attacks, human error and equipment failings are all hazards that can lead to sensitive data getting into unauthorised hands. Ultimately, it s the encryption of data that provides genuine assurance that the encrypted data is useless to unauthorised parties the last line of defence. The optimal solution is not the protection of the data network; it s the protection of the data itself. By encrypting the data, you can be assured that however accessed by an unauthorised party, it is protected by that last line of defence. This is why governments and defence forces around the world have encrypted information for hundreds of years. Typically, data networks used to transmit information are known as Layer 3, but when you encrypt Layer 3 networks, it s at a serious cost of 50% to 70% of network performance. On the other hand, Layer 2 networks do not suffer the same lost performance. They are used when high data volumes and performance needs demand more bandwidth and improved cost efficiency, together with best practice data security. 6

SO, WHY WOULD ANYONE EVER TRANSMIT UNENCRYPTED SENSITIVE DATA ON A NETWORK? QUALITY YOUR ASSURANCE OUR COMMITMENT Senetas encryptors are preferred by the world s most secure commercial and industrial organisations. Only Senetas encryptors hold all three leading testing authority certifications. Why do certifications matter to commercial and industrial organisations? The answer lies in the need for trusted assurance. That trusted assurance must be independent and rigorous. It provides maximum peace of mind that the security solution has stood up to the relentless evaluation processes of independent experts, who certify the products as suitable for government and defence use. These certifications involve years of rigorous testing by the testing authorities own labs. There is no higher standard. Senetas all-australian developed and manufactured encryptors provide our commercial and industrial customers with that trusted assurance. In addition to our encryptors certifications, Senetas customers have also undertaken their own proof of concept and even benchmarking testing. In every case, Senetas encryptors have excelled. Senetas customers also benefit from triple assurance because our encryptors include the only products of their type in the world to be certified by all three leading testing authorities - rather than just one. While government customers may require one testing authority certification, all our customers know that only Senetas hardware encryptors have been certified by multiple testing authorities. Our customers are assured maximum data protection and network performance. Our product certifications are: > > Federal Information Processing Standard (FIPS) - United States > > Common Criteria (international) > > CESG Assisted Products Service (CAPS) UK. To provide their stakeholders with the highest level of performance assurance, many commercial organisations adopt government certification requirements. They insist that products used to protect their sensitive data hold one or more of these independent certifications. ENCRYPTION WITHOUT COMPROMISE SENETAS R&D COMMITMENT Whether protecting data transmitted for Cloud computing; remote datacentre services; information-rich Big Data (multicast); CCTV traffic; or, infrastructure and industrial process and control systems; independent testing authorities certifications are valuable security and performance assurance. That s why Senetas continues to be 100% committed to testing authorities certifications. Ultimately, our customers are assured that should their networks be successfully breached, their data will be useless to unauthorised parties. And organisations providing services to the government and defence sectors such as Cloud computing or datacentre services are required to meet the certification standards of their government customers. That s why Senetas encryptors secure much of the world s most sensitive data! NOT ALL ENCRYPTION SOLUTIONS ARE THE SAME. DATA NETWORK EVESDROPPING AND SUCCESSFUL BREACHES PROVE THE VALUE OF TESTING AUTHORITY CERTIFICATIONS. 7

SECURITY WITHOUT COMPROMISE! BEST PERFORMANCE TRUSTED ASSURANCE SET AND FORGET High-Speed The designed-in market-leading performance capabilities make Senetas encryptors stand out. Whether 10Mbps, 100Mbps, 1Gbps or 10Gbps, they handsdown win competitive performance tests - every time! Their encryption speeds; near-zero data overhead; near-zero latency; and their consistent performance make Senetas encryptors ideally suited to the most demanding environments. They are preferred by many of the world s most secure organisations. Zero Latency Senetas high-speed encryptors are operate in full-duplex mode at full line speed without loss of packets. Latency is not affected by packet size (approx. >4 microseconds per unit at 10Gbps) meaning maximum throughput with zero protocol overhead. Importantly, by using Field Programmable Gate Array (FPGA) technology, this outstanding latency performance is predictable and dependable. Zero Impact The zero impact of Senetas encryptors is not limited to network bandwidth and speed (latency). It extends to network operations and management. They simply fit in within the user network. They don t require changes to other devices or network reorganisation. Zero impact makes Senetas encryptors a favourite among network engineers - they don t add load to network operations or management. Flexibility Senetas encryptors use of FPGA technology enables maximum operational flexibility. They better meet customers specific and unique requirements and provide an optimised high-speed data encryption solution. This multi-purpose flexibility enables on-going operational simplicity, such as in-field upgradability, as customers requirements change protecting their investment. It also enables unique capabilities such as implementing custom algorithms. Triple Certified Because Senetas encryptors include the only triple-certified products of their types, they are trusted by governments and defence forces around the world. This exhaustive and rigorous testing over many years provides our government and commercial customers with maximum assurance. Senetas encryptors are certified by: FIPS, CAPS and Common Criteria. Reliability Senetas encryptors are designed, developed and manufactured in Australia to exacting standards. In addition to the high levels of security, they provide reliable 99.999% uptime and conform to international requirements for safety and environment. Comprehensive Range All Topologies The Senetas CN range of Layer 2 Senetas encryptors operate in multipoint to multi-point (mesh); single-point encryptors provides the widest featureset able to operate at 10Mbps to 10Gbps to multi-point and single-point to singlepoint network topologies. Whether support, Fibre Channel; SONET/SDH and LINK protocols. This the network topology is simple or very extensive range provides cost-effective complex the same Senetas encryptor network-wide data protection. benefits apply. Cost Effective Senetas encryptors provide excellent total cost of ownership through a mix of: network bandwidth savings; ease of network management; longevity; reliability; interoperability; backward compatibility; minimal installation and management costs and solution flexibility. Other cost benefits include: low power consumption; minimal rack space use and combined rack space/power utilisation efficiency. Custom Algorithms In addition to the AES 256 bit algorithm, Senetas encryptors may be implemented with alternative, customer requested algorithms. Solution Integrity Senetas encryptors provide maximum solution integrity and the highest data protection investment return. Simplicity Set and forget and transparency are underlying Senetas design themes. They help ensure simplicity of implementation, operation and management low cost. That simplicity continues with an intuitive user interface providing meaningful descriptive diagnostics such as early warnings and simple fault-finding. They just do their job with minimal resource requirements. Easy to Install The Bump in the Wire design of Senetas encryptors makes them easy to install. Simply place the encryptor at the access point to the Layer 2 network and all data passing through the unit is encrypted using an AES 256 bit encryption algorithm. Interoperability Senetas encryptors that support the same protocol are fully interoperable. All Senetas CN models are backward compatible and provide the lowest network impact and overhead. Local or Centralised Management Configuration can be performed locally or remotely through the intuitive Senetas CM7 management software, which acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates. R&D Commitment Senetas s market-leading highspeed encryption results from its R&D commitment - to independent international testing certifications and high-speed encryption advances, such as support for Quantum Key Distribution. 8

NETWORK TOPOLOGIES Senetas encryptors support the following data network topologies and data speeds from 10MBPS to 10GBPS. POINT-TO-POINT CONNECTIONS Senetas encryptors protect data transmitted between network links at two locations via a fibre link or a managed connection. This direct transmission of encrypted data between the two locations is a point-to-point solution. Carrier s Layer 2 WAN POINT-TO-MULTIPOINT CONNECTIONS In the case of multiple locations such as branch offices connected to a single central head office site; the point-to-multipoint connections may be used. The branch locations may exchange data with the head office and optionally among each other. The access speed and the encryption for each site may vary and be chosen among 10Mbps, 100Mbps, 1Gbps or 10Gbps. Carrier s Layer 2 WAN 9

MULTI-POINT CONNECTIONS If there are many locations that communicate freely among each other, this is referred to as a multi-point or mesh environment. Hence a full multi-point solution may be optimal. Such a full multipoint solution looks similar to a large distributed where all encryptors see each other at Layer 2. Similar to the point-to-point and point-to-multipoint connections, Senetas encryption does not have any impact on the network functionality nor other network assets, thus allowing all services including multicast and broadcast applications to continue to operate unaffected. Carrier s Layer 2 WAN DATA STORAGE INTERCONNECTION Senetas encryptors also support the encryption of data transmitted between and among multiple data storage networks. The combination of the SONET/SDH encryptors and TDM multiplexors allows the encryption of data transmitted across links between and among multiple data centres. SAN SAN Multiplexor 10 Gbps 10 Gbps Multiplexor 10

ABOUT SENETAS Senetas is an all-australian company, specialising in certified network data protection hardware encrypting network data without compromising network performance. Senetas uniquely designs, develops and manufactures in Australia. Senetas certified high-speed encryption hardware has leading performance characteristics and is trusted by organisations in more than 25 countries to protect their sensitive data. These customers include highly secure organisations such as the US government and defence forces, global commercial organisations and Cloud service providers, regulatory and law enforcement bodies, banks, health providers and IP sensitive industrial organisations. Senetas certified encryptors protect: government and commercial information and secrets; Cloud computing services; datacentre traffic; CCTV networks; personal identity information and infrastructure process and control systems. Senetas is an award winning technology company. FURTHER INFORMATION Senetas encryptor technical information and specifications are available at There are a number of downloads available on the Senetas website, which provide facts about network data threats and Senetas certified encryption hardware solutions. Downloads include: > > Technical-Papers > > Solutions-Papers > > Case-Studies > > White-Papers > > brochures and technical information. The Senetas CN6040 encryptor provides an outstanding mix of cost-effective carrier-grade performance capabilities and flexibility, including 100% interoperability with every CN encryptor. 11