we secure YOUR network we secure network security English network security



Similar documents
Enhancing your security management

Security Management Station

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Intelligent Solutions for the Highest IT Security Requirements

Developing Network Security Strategies

Intelligent Solutions for the Highest IT Security Demands

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

Introduction of Quidway SecPath 1000 Security Gateway

Layer 3 Network + Dedicated Internet Connectivity

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Magnum Network Software DX

Technical papers Virtual private networks

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Virtual Privacy vs. Real Security

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Cisco Certified Security Professional (CCSP)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cornerstones of Security

Network Security. Protective and Dependable. Pioneer of IP Innovation

March

Gigabit SSL VPN Security Router

Recommended IP Telephony Architecture

Common Remote Service Platform (crsp) Security Concept

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Astaro Gateway Software Applications

Building Secure Networks for the Industrial World

The Cisco ASA 5500 as a Superior Firewall Solution

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Gigabit Multi-Homing VPN Security Router

Using Innominate mguard over BGAN

Cisco Virtual Office Express

Securing an IP SAN. Application Brief

IBX Business Network Platform Information Security Controls Document Classification [Public]

RuggedCom Solutions for

Case Study for Layer 3 Authentication and Encryption

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

CTS2134 Introduction to Networking. Module Network Security

IINS Implementing Cisco Network Security 3.0 (IINS)

Cisco ASA 5500 Series Firewall Edition for the Enterprise

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

The term Virtual Private Networks comes with a simple three-letter acronym VPN

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

APPENDIX 3 LOT 3: WIRELESS NETWORK

Figure 41-1 IP Filter Rules

Multi-Homing Dual WAN Firewall Router

Secure Network Foundation 1.1 Design Guide for Single Site Deployments

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Leased Line + Remote Dial-in connectivity

TABLE OF CONTENTS NETWORK SECURITY 2...1

Introduction to Endpoint Security

Chapter 8 Router and Network Management

NETASQ MIGRATING FROM V8 TO V9

Networking: EC Council Network Security Administrator NSA

CISCO IOS NETWORK SECURITY (IINS)

Security Policy Revision Date: 23 April 2009

Gigabit Multi-Homing VPN Security Router

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Firewall Architecture

Integrated Services Router with the "AIM-VPN/SSL" Module

Software. Quidview 56 CAMS 57. XLog NTAS 58

What would you like to protect?

NEFSIS DEDICATED SERVER

Cisco Advanced Services for Network Security

- Introduction to PIX/ASA Firewalls -

Network Management Card Security Implementation

Industrial Security Router Overview

Cisco ASA 5500 Series Firewall Edition for the Enterprise

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Quidway SVN3000 Security Access Gateway

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway


SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

WATCHGUARD FIREBOX VCLASS

Best Practices for PCI DSS V3.0 Network Security Compliance

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Edgewater Routers User Guide

Network Security Administrator

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Gigabit Content Security Router

WAN Failover Scenarios Using Digi Wireless WAN Routers

WAN Traffic Management with PowerLink Pro100

EtherDevice Switch EDS-726 Series

AT-S41 Version Management Software for the AT-8326 and AT-8350 Series Fast Ethernet Switches. Software Release Notes

"Charting the Course...

Achieving PCI-Compliance through Cyberoam

How To Build A Network Security Firewall

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Data Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Cisco Wireless Security Gateway R2

Transcription:

we secure YOUR network English network security network security

CryptoGuard VPN family The CryptoGuard VPN 5000 family is a flexible (cost-)effective security system, completely developed by Compumatica. It is deployed in highly sensitive areas. CryptoGuard VPN enables the secure and confidential communication within a single LAN and in protected linking of several LANs, even over public networks. Sensitive data is protected against unauthorized use during transportation over insecure public networks. Features CryptoGuard VPN Encryption on layer 2, 3 and 4 Packet filter firewall, protocol, source-destination Black box transparent mode, not detectable Simple integration in existing networks IPsec encryption and authentication VPN mode: payload encryption, no data expansion Perfectly qualified for satellite communication Latency less than 1 ms. Algorithms: AES up to 256bit, 3DES Customization possible e.g. S-boxes and algorithms Strong pseudo random generator, hard- or software Redundancy based on OSPF or STP Support of VLANs Support of jumbo frames Security components: CF-card and smartcard Scalable throughput up to Gigabit connections Hardened Operating System (COS) Mobile communication Compumatica offers several complementary solutions for remote communication. Our CompuWall in combination with a Windows client. From everywhere in the world: working as in the office. All information can be available. If you combine CompuWall with our secure GSM encrypted voice, SMS and encrypted mail can be implemented. CryptoGuard VPN Client is a software solution for the encrypted communication of a single PC or laptop with a central server or company network. CryptoGuard VPN 500 CryptoGuard VPN 500 is the smallest model of the CryptoGuard VPN product-range. It represents an cost-effective solution for individual PCs, small networks and servers. CryptoGuard VPN 500 provides the same features as the other models of the product-range. Highest security for voice, data and video over IP VPN solutions for Intranet and Internet CryptoGuard VPN 5000 CryptoGuard VPN 5000 secures your Fast Ethernet network connections using standardized encryption algorithms (AES) and protocols (IKE and IPsec). Next to our proven CryptOn technology for secure key storage, CryptoGuard VPN 5000 supports smartcards as well. Networks with a capacity up to 100 Mbps full duplex are supported. CryptoGuard VPN 5000 Gigabit CryptoGuard VPN 5000 Gigabit is the top model of our proven quality CryptoGuard VPN product-range. Apart from the usual security needs, CryptoGuard VPN 5000 Gigabit also meets the performance requirements of a Gigabit Ethernet network with throughput up to 1Gbps.

Security Management Station The Security Management Station (SMS) allows the central management of the several security components (CryptoGuard VPN, CryptoBastion) with versatile options and a user-friendly interface. The rules are defined in the SMS and the security components will be configured automatically, conform to the topological information. Furthermore, the SMS offers an intelligent key management system and several options to configure VPNs. To prevent a classic attack on firewall systems, the communication between the SMS and the security components is encrypted with modern algorithms. The SMS can easily be integrated in an existing network and enables virtual network computing all over the world. The SMS is the heart and the brain of the network security system. Central Security Management High-level overview Features Centralized Security Management Downward compatible up to the first release Unix based operating system Central data backup and restore Underlying high performance database Access control and role based administration Easy integration in existing network infrastructures Encrypted communication between SMS and security components Generation of secure connections using profile mechanisms Visualizing of connections Automatic rule generation with fault tolerance checking Intelligent, central and secure key management Hardware or software random generation Monitoring and alarm mechanisms SNMP interface Batch-job scheduling Redundancy mechanism

CryptoBastion The CryptoBastion as application level firewall separates the attached networks logically and physically. The entire network traffic between the connected subnets is checked and granted by this single entity. Proxy applications for the most widespread services establish the connections for the desired services and protocols. Misconfiguration is prevented by the applied principle "Everything is strictly prohibited, unless it s explicitly allowed. The versatile, modular CryptoBastion offers Unified Threat Management because of the newly implemented features: OpenVPN Host-IDS AntiVIRUS AntiSPAM SSL secured client as well as site2site access Every file system change will be reported Check for malware for HTTP(S), FTP, ESMTP and POP3 Dispose unwanted mails for ESMTP and POP3 High availability through two CryptoBastion firewalls, either in active/active or active/passive mode, load balancing enabled selectively. Strict and reliable Firewall security! CompuWall is the flexible CryptoBastion stand-alone firewall solution with web management for security sensitive network administration. It combines a high security standard with outstanding performance. The CompuWall is managed via a SSL secured browser connection and provides an intuitive graphical user interface. Configurable proxy applications are available for HTTP(S), FTP, Telnet, (E)SMTP, NNTP, POP3, RTSP, NET8, TCPR and UDPR. CompuWall features the special option to realize secure user authentication by means of mobile phone authentication, in addition to simple password, one time password, LDAP and/or RADIUS authentication. CryptoWall is the high-end security solution in a multi-stage security environment. By applying different hard- and software modules, solutions can be customized individually. Security sensitive enterprises can choose from various active firewall elements, different platforms and operating systems, define proxies and equip the firewall system with extra functionalities. CryptoWall is based on tested-and-assured certified firewall components. A CryptoWall consists of a combination of CryptoGuard VPN and CryptoBastion components.

Sharing data, voice, and video, internally and between companies and organizations has increased dramatically over the last years. The value of information is enormous and needs to be protected. Unauthorized access to data accidentally or on purpose must be prevented. Securing IP traffic by high level encryption is the solution to this problem. Creating security awareness at management and employee level is basic. It is advisable to separate the network and security responsibilities. For the network manager the availability and accessibility of the network will have priority. The security manager focuses on protecting data and unauthorized access. Managing both security and access by the same person can lead to conflicting interests and incidents. Security added to routers may seem easy and cheap, but is not optimal from a security point of view. Compumatica advices to use routers for network management and Crypto devices for data protection. Network security to perfection CALEA, the US law for interception of all IP and telephone data, gives several organizations insight information of your data. Interception of IP traffic by worldwide telecommunication providers and governmental bodies makes sending of company (government) confidential data risky and dangerous. You never know who has access to your information. Compumatica assures that all its products are backdoor free. Data, protected by the CryptoGuard, is invisible and unreadable for unauthorized people. CryptoGuard VPN 100 % backdoor free

CompuCrypt XL Network connections that require high speed encrypted throughput use the CompuCrypt XL. The CompuCrypt XL is the newest security system of Compumatica. With the CompuCrypt XL it is possible to encrypt IP data, voice and video up to speeds of 10 Gbps. Default algorithm is AES key lengths 128, 192, 256 bits. Key material and all configuration data are stored on a smartcard by the CompuCrypt Management System. The CCM is an straight forward and easy to handle management system. Different models and features will be developed in the future. Compumatica GSM Secure communication via GSM is more and more a need for management and international travelers. Encrypted voice and SMS protect companies confidential information from interception. The unique combination of the Compumatica GSM with the CompuWall in your office encrypts and protects all your e-mail and log-in to your network. Standard AES 256 bits encryption is implemented. Specific S- boxes can be implemented. Remote management by the Key Management System allows additional features. GSM +31413334668 Menu Contact Special product versions approvals Apart from the commercial product portfolio, Compumatica provides an additional supply of country-specific encryption devices, special algorithms and S-boxes. This can be your own or developed by our crypto department. The products can furthermore be equipped as to comply with all TEMPEST stages as defined in SDIP 27 A,B or C. Approved for governmental use The devices received the approval for VS-NfD from the German authorities, approved Departementaal Vertrouwelijk for Dutch authorities and EU restricted for the European Community. Approved for NATO-Restricted Compumatica has also developed a variant which received the approval for the classification level NATO-Restricted. Compumatica secure networks based in Germany and the Netherlands is an independent private company with as main objective the securing of its customers IP traffic. Compumatica develops, produces and implements high level security solutions to all types of IP networks and customers. Customers may be a small organization with just a few countrywide connections or multinational companies with large worldwide networks. Compumatica staff and products comply with high standards of reliability and quality. Every single product goes through a quality assurance phase in which it is subjected to thorough long-term tests. All Compumatica products are backward compatible for more than ten years. Herewith we guarantee our customers investment protection. Customers of Compumatica are well named Top 500 companies as well as Governments of several countries who use our solutions to protect their critical data. Compumatica secure networks GmbH Germanusstrasse 4 52080 Aachen Germany Phone +49 (0)241 16 96-400 Fax +49 (0)241 16 96-410 www.compumatica.eu info@compumatica.eu Deutsche Krypto Industrie Compumatica secure networks bv Oude Udenseweg 29 5405 PD Uden The Netherlands Phone +31 (0)413 334668 Fax +31 (0)413 334669 www.compumatica.eu info@compumatica.eu Nederlandse Crypto Industrie