High Speed Ethernet WAN: Is encryption compromising your network?

Similar documents
High speed Ethernet WAN: Is encryption compromising your network?

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

High Speed Encryption Made in Germany

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

Virtual Privacy vs. Real Security

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet Group Encryption

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

ethernet services for multi-site connectivity security, performance, ip transparency

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

MPLS provides multi-site solution

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

Cisco Advanced Services for Network Security

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

WAN and VPN Solutions:

Virtualized Security: The Next Generation of Consolidation

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Preparing Your IP network for High Definition Video Conferencing

How To Protect Your Data From Harm With Safenet

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

November Defining the Value of MPLS VPNs

How To Secure My Data

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Integrated Services Router with the "AIM-VPN/SSL" Module

1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3

Enterprise Business Products 2014

Portable Wireless Mesh Networks: Competitive Differentiation

Integrated Services Router with the "AIM-VPN/SSL" Module

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

VPN. Date: 4/15/2004 By: Heena Patel

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Quantum StorNext. Product Brief: Distributed LAN Client

diversifeye Application Note

White Paper. Complementing or Migrating MPLS Networks

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

Network performance in virtual infrastructures

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Demonstrating the high performance and feature richness of the compact MX Series

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB _v02

the about MPLS security

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Network Design Best Practices for Deploying WLAN Switches

WAN Optimization. Riverbed Steelhead Appliances

Juniper Networks QFabric: Scaling for the Modern Data Center

Definition. A Historical Example

Site2Site VPN Optimization Solutions

Cisco Virtual Office Express

EPIPE Connectivity Services

CHAPTER 1 INTRODUCTION

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

for Lync Interaction Recording

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Cisco Integrated Services Routers Performance Overview

Sprint Global MPLS VPN IP Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

VOIP Guide Using ZyXEL Switch

Brocade One Data Center Cloud-Optimized Networks

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Optimizing Networks for NASPI

How To Configure Voice Vlan On An Ip Phone

Application Note How To Determine Bandwidth Requirements

Partner with the UK s leading. Managed Security Service Provider

Allied Telesis provide virtual customer networks

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITE PAPER: Broadband Bonding for VoIP & UC Applications. In Brief. mushroomnetworks.com. Applications. Challenge. Solution. Benefits.

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Preparing Your IP Network for High Definition Video Conferencing

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

NEN Community REANNZ. Design Statement: NEN Edge Device

Voice over IP Networks: Ensuring quality through proactive link management

Cisco WAAS Optimized for Citrix XenDesktop

White Paper. Accelerating VMware vsphere Replication with Silver Peak

Network Virtualization Network Admission Control Deployment Guide

Transcription:

High Speed Ethernet WAN: Is encryption compromising your network? 2015 Gemalto 2015. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain countries. JUL062015

IPsec encryption facts: 27% Throughput At smaller frame sizes typical of voice and video, IPsec encryption achieves only 27% of maximum theoretical throughput. 73% 47% 27% 256 128 64 frame size (bytes) 14 12 10 8 6 4 2 0 % increase 13x Latency IPsec encryption increase latency 6-13 times. 1024 512 256 128 64 frame size (bytes) IPsec encryption SafeNet encryption 40% of bandwith IPsec encryption can consume up to 40% of available bandwidth. 60% 40% available bandwidth IPsec processing Data from Rochester Institute of Technology: Comparative Performance of Layer 2 and IPsec Encryption on Ethernet Networks Testing exposed the detrimental effect on network performance that is typically imposed by IPsec s innate processing requirements

SafeNet s Layer 2 network encryption solution delivers: > > maximum performance > > strongest available protection > > certified to FIPS 140 2 level 3, Common Criteria and CAPS (UK)* > > the least administrative overhead > > the lowest total cost of ownership *Approved models Gemalto enables you to implement a totally secure, full performance, high speed Ethernet WAN, ensuring your data is secure. Gemalto s SafeNet Network Encryption Solution delivers the fastest initial setup, with no need for network reconfiguration, no need for routing table updates, and has no negative impact on network performance or architecture.

Maximum throughput with zero protocol overhead throughput (Mbps) Comparative encrypted throughput data 1000 900 800 700 600 500 400 300 200 100 0 1420 1280 1024 512 256 128 64 frame size (bytes) Ethernet encryption IPsec encryption Gemalto s SafeNet high speed Layer 2 encryption technology introduces zero protocol overhead so that maximum bandwidth is available for data up to 50% more efficient than competing technologies. SafeNet High Speed Encryptors provide the fastest network encryption available, operating at true line speed. SafeNet High Speed Encryptors have no impact on latency, ensuring the high quality of realtime applications such as VoIP and video applications with smaller frame sizes. High availability features support architectures with over 99.999% uptime.

Strongest available protection to AES-256 and tamper-proof to FIPS 140-2 level 3 SafeNet high speed encryptors from Gemalto use the strongest cryptographic algorithms that are publicly available (the Advanced Encryption Standard AES-256), developed by NIST and approved by the NSA for top secret information. Routers and firewalls are plagued by a constant stream of vulnerabilities and attacks. SafeNet encryptors, operating at Layer 2, do not routinely require security patches. Physically, Gemalto offers high speed Ethernet encryptors with a tamper-proof design, certified to FIPS 140 2 level 3, Common Criteria and CAPS (UK)*. *Approved models

Minimal administrative overhead for low operational expenditure A big advantage of Gemalto s SafeNet Network encryption solution is the low administrative overhead. Using our superior management platform, SafeNet High Speed Encryptors (HSE) can be set up in minutes. There s no need for network reconfiguration and no need for routing table updates routing updates are transparent to encryption. As setup and configuration is so easy, less expertise is required. There s no need to manually build complex addressing tables and policies because HSE encryptors automatically discover network MAC addresses. When new encryptors are added key discovery is fully automatic. Because of SafeNet encryptors unique feature offering, SafeNet HSE encryptors unique features enable them to be seamlessly overlaid onto any network topology. 1 2 3 4 5 6 7 8 9 contact

Lowest capital cost SafeNet High Speed Encryptors are the lowest cost solution for aggregation of multiple sites and for high speed networks. Fewer encryptors need to be installed compared to a solution that uses additional routers and IPsec encryption devices. The simple network topology possible with SafeNet High Speed Encryptors decreases the complexity of network infrastructure, maintenance and administration, supports all Layer 2 network protocols, and is easily and rapidly scalable to thousands of devices. And of course, reclaiming your network bandwidth could save you a great deal of money every month. 1 2 3 4 5 6 7 8 9 contact

SafeNet s Network Encryption Solutions Gemalto s SafeNet Network Encryption Solution not only simplifies management, it also allows speedy scaling to thousands of devices with auto-device discovery. Dedicated encryption processing means routers and other network devices are not burdened with encryption improving overall network headroom, resilience and performance. A built-in key leader means no need for external key management, any encryptor can be designated as the key leader for automatically generating keys for the entire encryptor network. Multipoint support allows one encryptor to connect to hundreds of branch offices. SafeNet High Speed Ethernet encryptors also have built-in VLAN support.

85% of inter-bank transfers are carried on SafeNet High Speed Ethernet encryptors Gemalto offers the world s only complete suite of dedicated high speed WAN encryption solutions. In addition to Ethernet, SafeNet High Speed Encryptors also supports SONET/SDH, ATM, and Fibre Channel. 85% of inter-bank transfers are carried on high speed links encrypted by SafeNet High Speed Encryptors, and our devices are used by many enterprises and government agencies across the globe. Gemalto is the world leader in digital security. SafeNet High Speed Encryptors from Gemalto are designed and built from the ground up as security machines. There is no better option. Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: data-protection.safenet-inc.com GEMALTO.COM