Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT



Similar documents
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

data Centres solutions-paper

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

High Speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network?

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NETWORK SECURITY.

How To Secure My Data

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

High Speed Encryption Made in Germany

Virtual Privacy vs. Real Security

SureDrop Secure collaboration. Without compromise.

How To Protect Your Data From Harm With Safenet

Technical papers Virtual private networks

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Fiber-Optic Networks: Is Safety Just an Optical Illusion?

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Building A Secure Microsoft Exchange Continuity Appliance

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

the about MPLS security

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Preparing Your IP Network for High Definition Video Conferencing

USER-MANAGED FILE SERVER BACKUP:

Enterprise Business Products 2014

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

How To Protect Your Data From Being Hacked

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

ethernet services for multi-site connectivity security, performance, ip transparency

The Next Generation Network:

Adobe Systems Software Ireland Ltd

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

A practical guide to IT security

Portable Wireless Mesh Networks: Competitive Differentiation

RFC 2544 Testing of Ethernet Services in Telecom Networks

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

WAN and VPN Solutions:

White paper. Why Encrypt? Securing without compromising communications

Dante: Know It, Use It, Troubleshoot It.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Gold Lock Desktop White Paper

The Education Fellowship Finance Centralisation IT Security Strategy

Preparing Your IP network for High Definition Video Conferencing

Wireless Encryption Protection

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

Layer 2 Encryption Fortifying data transport

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security and Risk Analysis of VoIP Networks

Security Issues with Integrated Smart Buildings

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

Who s next after TalkTalk?

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

Data Center Interconnect

TrustNet Group Encryption

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Using & Offering Wholesale Ethernet Network and Operational Considerations

Managed Encryption Service

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

YOUR CANADIAN CONNECTION

TrustWay: the high security solution

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

Voice and Data Convergence

Western Australian Auditor General s Report. Information Systems Audit Report

BANKING SECURITY and COMPLIANCE

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

FibeAir I500R High Capacity Wireless Network Solution

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Central Technology. Seamless IT & Communication Solutions

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Transcription:

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR

SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE NETWORK TRANSMITTED DATA. Our defence-grade network data encryptors are specialist hardware products, dedicated to protect sensitive government data while being transmitted across data networks - without the costs of compromising high-speed network performance. Senetas hardware encryptors provide government departments and agencies the exceptional peace of mind of multiple independent, international testing authorities certifications as suitable for government and defence use FIPS, Common Criteria and CAPS. MAXIMUM DATA PROTECTION WITHOUT NETWORK COMPROMISE Recognised as leading encryptors of their type, Senetas high-speed encryptors are certified by all three leading international, independent testing authorities. They are used by governments in more than 20 countries to protect their sensitive data, including: Cloud computing Big Data Data centres CCTV networks. Our encryptors protect government data from network breaches cyber-crime and attacks: Eavesdropping Data theft Input of rogue data Innocent human and technical errors. That assurance of multiple certifications is one important reason why Senetas certified encryptors protect much of the world s most sensitive data and are the first choice of US government departments and US defence forces. Senetas certified encryptors provide the critical last line of defence. They ensure that unauthorised parties who successfully breach networks only obtain meaningless rubbish. They also overcome security and performance weaknesses of other security products: Significant loss of data network performance Exposure to technology vulnerabilities. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 2

BEST PERFORMANCE TRUSTED ASSURANCE SIMPLICITY Our government customers transmit highly sensitive data across a wide range of data networks from complex global to simple point-to-point networks. Independent, international government testing authorities certifications are very important to governments all over the world. Data sensitivity is classified and the certification requirements are set. Our customers benefit from the exhaustive independent testing authorities product certifications thorough on-going processes of performance evaluations. And all three leading international certification authorities FIPS, Common Criteria and CAPS have certified Senetas encryptors. This is a performance standard unmatched by any other manufacturer! Senetas encryptors ensure that best data protection need not come at the heavy cost of reduced network performance. They enable maximum data network performance through their designed-in zero-latency, zero-overhead and zero network impact. They are also as simple to install and manage as set and forget! NETWORK BREACHES RISKS OF CATASTROPHIC DAMAGE Serious government data network breaches include: Data sniffing, eavesdropping and theft Citizen privacy breaches Redirection of data Cyber-attacks and damage to data integrity Human errors and systems and hardware failures e.g. incorrect network configuration Input of damaging rogue data New technologies delivering efficiencies to government organisations transmit large volumes of data that make even small network breaches potentially catastrophic: Loss of trust and reputation Financial losses and compensation costs Theft of government secrets Breach of privacy and identity theft Damage to data integrity and critical infrastructure and assets. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 3

WHY ENCRYPT SENSITIVE NETWORK DATA? DATA NETWORK BREACHES HIGHLIGHT THE IMPORTANCE OF PROTECTING THE DATA ITSELF. CERTIFIED ENCRYPTION HARDWARE DEDICATED TO DATA SECURITY - IS THE ULTIMATE DATA PROTECTION. CLOUD, DATA CENTRE, BIG DATA AND OTHER TECHNOLOGIES NEED THE BEST DATA PROTECTION AND MAXIMUM NETWORK PERFORMANCE. The need to protect government organisations sensitive information within their systems is clear. But, the need to protect transmitted network data has not been so obvious. Leading data security organisations highlight that many organisations do not sufficiently protect network data once outside their direct control. Who really knows what happens to their data while transmitted to another location? Network data is easily and cheaply monitored, tapped, stolen, tampered with and redirected by cyber-criminals. In its 2012 Global Data Security Report, awarded information security experts Trustwave noted that 62.5% of data theft occurred while in transit. It also pointed to increasing cyber-criminal focus on data in transit. Furthermore, data travelling through networks is not just exposed to risks of cyber-attack; there are also genuine risks of transmission to wrong locations. Human error and technical equipment failings are real risks that can manifest more often than you would think. The common issue that organisations face is a breach of data privacy and/or integrity as well as criminal damage such as the loss of valuable intellectual property, whatever the original cause. However, these risks can be eliminated - and security assured - by automatically encrypting the data while it s in motion. Your network data commercial, government or industrial data, voice, video, or all three should be encrypted to protect your organisation and its stakeholders. Importantly, data security advisors highlight that almost all network data should be encrypted. They argue that in large volumes, even low value data, when aggregated, can be useful to cyber-criminals and any network breach has potential to be harmful to reputations and stakeholders trust. In the past, data encryption came at a huge cost of network performance due to latency and encryption overheads. Senetas then developed zero-latency encryptors with zero overhead and impact on network assets maximum network performance and maximum data protection. Two serious network breach issues have been identified by data security analysts the seemingly harmless breach today may be very harmful in the future; and that most breaches remain undetected in the long-term. Australian manufacturer, Codan Ltd., only became aware of an earlier network breach when it discovered the theft of its products intellectual property, which had led to a massive decline in market share due to counterfeiting reported to it by its dealers years later. It s often assumed that data networks are safe. The reality is they are not. Cyber-attacks, human error and equipment failings are all hazards that can lead to sensitive data getting into unauthorised hands. Ultimately, it s the encryption of data that provides genuine assurance that the encrypted data is useless to unauthorised parties the last line of defence. The optimal solution is not the protection of the data network; it s the protection of the data itself. By encrypting the data, you can be assured that however accessed by an unauthorised party, it is protected by that last line of defence. This is why governments and defence forces around the world have encrypted information for hundreds of years. Typically, data networks used to transmit information are known as Layer 3, but when you encrypt Layer 3 networks, it s at a serious cost of 50% to 70% of network performance. On the other hand, Layer 2 networks do not suffer the same lost performance. They are used when high data volumes and performance needs demand more bandwidth and improved cost efficiency, together with best practice data security. WHO WOULD EVER EMAIL OR POST UNENCRYPTED SENSITIVE DATA? WHO WOULD EVER LEAVE UNENCRYPTED SENSITIVE DATA ON A LAPTOP? SO, WHY WOULD ANYONE EVER TRANSMIT UNENCRYPTED SENSITIVE DATA ON A NETWORK? VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 4

CERTIFICATIONS YOUR ASSURANCE OUR COMMITMENT SENETAS ENCRYPTORS ARE PREFERRED BY THE WORLD S MOST SECURE AND DEFENCE ORGANISATIONS. ONLY SENETAS ENCRYPTORS HOLD ALL THREE LEADING INTERNATIONAL, INDEPENDENT, AND TESTING AUTHORITY CERTIFICATIONS. Senetas government customers are assured of our encryptors leading performance by the certifications provided by the leading testing authorities. These certifications involve years of rigorous testing by the testing authorities own labs. They are certified as suitable for government and defence use. Products without these certifications are unable to be installed in the respective government data networks. Senetas all-australian developed and manufactured defence-grade encryptors provide our government customers the best assurance that their network data is protected by the rigorous independent testing authority standards and perform as specified. In addition to our encryptors certifications, government and defence customers have also undertaken their own proof of concept and even benchmarking testing. In every case, Senetas encryptors have excelled. Senetas customers also benefit from triple assurance because our encryptors include the only products of their type in the world to be certified by all three leading authorities, rather than just one. While government customers may require just one testing authority certification, they know that only Senetas hardware encryptors have also been certified by other testing authorities. Our customers assured maximum network performance. Our product certifications are: Federal Information Processing Standard (FIPS) - United States Common Criteria (international and Australia) CESG Assisted Products Service (CAPS) UK. To provide their stakeholders with a preferred level of performance assurance, many commercial organisations have followed government certification requirements. They insist that products used to protect their sensitive data hold one or more of these independent certifications. ENCRYPTION WITHOUT COMPROMISE SENETAS R&D COMMITMENT Whether protecting data transmitted for Cloud computing; remote data centre services; information-rich Big Data (multicast); CCTV traffic; or, infrastructure and industrial process and control systems; independent testing authorities certifications are valuable security and performance assurance. That is why Senetas has always been 100% committed to testing authorities certifications. Ultimately, our government customers are assured that should their networks be successfully breached, their data will be useless to unauthorised parties. Importantly, organisations providing services to the government and defence sectors such as Cloud computing or data centre storage services will meet certification requirements of their government customers when using certified Senetas products. That s why Senetas encryptors secure much of the world s most sensitive data! NOT ALL ENCRYPTION SOLUTIONS ARE THE SAME. DATA NETWORK EVESDROPPING AND SUCCESSFUL BREACHES PROVE THE VALUE OF TESTING AUTHORITY CERTIFICATIONS. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 5

SECURITY WITHOUT COMPROMISE! Best Performance Trusted Assurance Set and Forget HIGH-SPEED The designed-in market-leading performance capabilities make Senetas encryptors stand out. Whether 10Mbps, 100Mbps, 1Gbps or 10Gbps, they hands-down win competitive performance tests - every time! Their encryption speeds; near-zero data overhead; near-zero latency; and their consistent performance make Senetas encryptors ideally suited to the most demanding environments. They are preferred by many of the world s most secure organisations. ZERO LATENCY Senetas high-speed encryptors are operate in full-duplex mode at full line speed without loss of packets. Latency is not affected by packet size (approx. >4 microseconds per unit at 10Gbps) meaning maximum throughput with zero protocol overhead. Importantly, by using Field Programmable Gate Array (FPGA) technology, this outstanding latency performance is predictable and dependable. ZERO IMPACT The zero impact of Senetas encryptors is not limited to network bandwidth and speed (latency). It extends to network operations and management. They simply fit in within the user network. They don t require changes to other devices or network reorganisation. Zero impact makes Senetas encryptors a favourite among network engineers - they don t add load to network operations or management. FLEXIBILITY Senetas encryptors use of FPGA technology enables maximum operational flexibility. They better meet customers specific and unique requirements and provide an optimised high-speed data encryption solution. This multipurpose flexibility enables on-going operational simplicity, such as infield upgradability, as customers requirements change protecting their investment. It also enables unique capabilities such as implementing custom algorithms. TRIPLE CERTIFIED Because Senetas encryptors include the only triple-certified products of their types, they are trusted by governments and defence forces around the world. This exhaustive and rigorous testing over many years provides our government and commercial customers with maximum assurance. Senetas encryptors are certified by: FIPS, CAPS and Common Criteria. RELIABILITY Senetas encryptors are designed, developed and manufactured in Australia to exacting standards. In addition to the high levels of security, they provide reliable 99.999% uptime and conform to international requirements for safety and environment. COMPREHENSIVE RANGE The Senetas CN range of Layer 2 encryptors provides the widest feature-set able to operate at 10Mbps to 10Gbps support Ethernet, Fibre Channel; SONET/SDH and LINK protocols. This extensive range provides costeffective network-wide data protection. COST EFFECTIVE Senetas encryptors provide excellent total cost of ownership through a mix of: network bandwidth savings; ease of network management; longevity; reliability; interoperability; backward compatibility; minimal installation and management costs and solution flexibility. Other cost benefits include: low power consumption; minimal rack space use and combined rack space/power utilisation efficiency. CUSTOM ALGORITHMS In addition to the AES 256 bit algorithm, Senetas encryptors may be implemented with alternative, customer requested algorithms. SOLUTION INTEGRITY Senetas encryptors provide maximum solution integrity and the highest data protection investment return. SIMPLICITY Set and forget and transparency are underlying Senetas design themes. They help ensure simplicity of implementation, operation and management low cost. That simplicity continues with an intuitive user interface providing meaningful descriptive diagnostics such as early warnings and simple faultfinding. They just do their job with minimal resource requirements. EASY TO INSTALL The Bump in the Wire design of Senetas encryptors makes them easy to install. Simply place the encryptor at the access point to the Layer 2 network and all data passing through the unit is encrypted using an AES 256 bit encryption algorithm. ALL TOPOLOGIES Senetas encryptors operate in multipoint to multi-point (mesh); singlepoint to multi-point and single-point to single-point network topologies. Whether the network topology is simple or very complex the same Senetas encryptor benefits apply. INTEROPERABILITY Senetas encryptors that support the same protocol are fully interoperable. All Senetas CN models are backward compatible and provide the lowest network impact and overhead. LOCAL OR CENTRALISED MANAGEMENT Configuration can be performed locally or remotely through the intuitive Senetas CM7 management software, which acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates. R&D COMMITMENT Senetas s market-leading highspeed encryption results from its R&D commitment - to independent international testing certifications and high-speed encryption advances, such as support for Quantum Key Distribution. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 6

NETWORK TOPOLOGIES SENETAS ENCRYPTORS SUPPORT THE FOLLOWING DATA NETWORK TOPOLOGIES AND DATA SPEEDS FROM 10MBPS TO 10GBPS. POINT-TO-POINT CONNECTIONS Senetas encryptors protect data transmitted between network links at two locations via a fibre link or a managed Ethernet connection. This direct transmission of encrypted data between the two locations is a point-to-point solution. POINT-TO-MULTIPOINT CONNECTIONS In the case of multiple locations such as branch offices connected to a single central head office site; the point-to-multipoint connections may be used. The branch locations may exchange data with the head office and optionally among each other. The access speed and the encryption for each site may vary and be chosen among 10Mbps, 100Mbps, 1Gbps or 10Gbps. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 7

MULTI-POINT CONNECTIONS If there are many locations that communicate freely among each other, this is referred to as a multi-point or mesh environment. Hence a full multi-point solution may be optimal. Such a full multipoint solution looks similar to a large distributed LAN where all encryptors see each other at Layer 2. Similar to the point-to-point and point-to-multipoint connections, Senetas encryption does not have any impact on the network functionality nor other network assets, thus allowing all services including multicast and broadcast applications to continue to operate unaffected. DATA STORAGE INTERCONNECTION Senetas encryptors also support the encryption of data transmitted between and among multiple data storage networks. The combination of the SONET/SDH encryptors and TDM multiplexors allows the encryption of data transmitted across links between and among multiple data centres. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 8

ABOUT SENETAS SENETAS IS AN ALL-AUSTRALIAN COMPANY, SPECIALISING IN CERTIFIED NETWORK DATA PROTECTION HARDWARE - ENCRYPTING NETWORK DATA WITHOUT COMPROMISING NETWORK PERFORMANCE. Senetas uniquely designs, develops and manufactures in Australia. Senetas certified high-speed encryptor hardware has leading performance characteristics and is trusted by governments around the world to protect their sensitive data. These customers include highly secure organisations such as the US government and defence forces; and governments regulatory bodies, taxation agencies and other departments. Senetas certified encryptors protect: government information and secrets; Cloud computing services; data centre traffic; CCTV networks; personal identity information and infrastructure process and control systems. Senetas won the 2014 iaward for technology innovation and its benefits to the government sector. OUR CUSTOMERS Senetas government customers include the following types of organisations in more than 20 countries: Requiring Common Criteria (international, FIPS (US) and CAPS (UK) product certifications as suitable for government and defence use. Government agencies law enforcement, service agencies, regulatory bodies, etc Defence and military Cross-government agency and departments data-sharing Telecommunications carriers networks services provided to governments Cloud computing and data centre services increasing use by governments Inter and intra-office data networks. FURTHER INFORMATION SENETAS ENCRYPTOR TECHNICAL INFORMATION AND SPECIFICATIONS ARE AVAILABLE AT: WWW.SENETAS.COM There are a number of downloads available on the Senetas website, which provide facts about network data threats and Senetas certified encryption hardware solutions. WWW.SENETAS.COM Downloads include: White-Papers Solutions-Papers Case-Studies. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 9