The portfolio of Crypto AG: comprehensive solutions for the security of your information



Similar documents
Secure telephony via classic and IP networks. office security solutions

MultiCom Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions

High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks

Secure telephone communications with Voice over IP from Crypto AG

Fax Encryption HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions

Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA,

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

Intelligent Solutions for the Highest IT Security Demands

R&S RNMS3000 Radio Network Management System Utilization planning, radio network configuration and data distribution

Intelligent Solutions for the Highest IT Security Requirements

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

successstory Security for Diplomacy High Security for Embassy Networks

White paper. Reliable and Scalable TETRA networks

Propsim enabled Mobile Ad-hoc Network Testing

How To Build A Network For Storage Area Network (San)

ENTERPRISE CONNECTIVITY

Portable Wireless Mesh Networks: Competitive Differentiation

Managed Network Services

Copyright and Trademark Statement

Transparent LAN Services Offer Visible Benefits

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SytemsInsight QUICK REFERENCE GUIDE. Going further in critical communications

November Defining the Value of MPLS VPNs

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

About Advent One. Contents. 02 What we do. 03 Infrastructure Services. 04 Cloud and Managed Services. 07 Hosting Desktop. 08 Phone.

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

WAN Data Link Protocols

ICTNPL5071A Develop planning strategies for core network design

ethernet services for multi-site connectivity security, performance, ip transparency

Partner with the UK s leading. Managed Security Service Provider

Vodacom Business Solutions Portfolio. The complete package... Your guide to business solutions from Vodacom Business

INFORMATION COMMUNICATION TECHNOLOGY PLAN

VPN. Date: 4/15/2004 By: Heena Patel

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Communication Networks. MAP-TELE 2011/12 José Ruela

WAN Traffic Management with PowerLink Pro100

Protecting your information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

we secure YOUR network we secure network security English network security

Injazat s Managed Services Portfolio

TC Infrastructure & Application Operations. Direct Network Links.

RC:

for Lync Interaction Recording

Argos Thuraya Interception L-Band System

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

NEXIUM SAT. Satcom systems solutions

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

Local Area Networks (LANs) Blueprint (May 2012 Release)

An Introduction to SIP

CHEIA Satellite Communication Center

secure For the ultimate in Cyber Defence TRL Technology

R&S Postman III Radiocommunications system for stateof-the-art. data transmission. Product Brochure Secure Communications

White Paper Creating a Video Matrix over IP

This course has been retired. View the schedule of current <a href=

TELECOM HF VHF UHF over IP

IP Video Surveillance

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

SIP Trunks. The cost-effective and flexible alternative to ISDN

VOIP-BASED VOICE COMMUNICATIONS CONTROL SYSTEM

MPLS VPN basics. E-Guide

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Optimizing Networks for NASPI

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

TrustWay: the high security solution

Simplifying advanced communications

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

Product Information = = = sales@te-systems.de phone

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Case Study for Layer 3 Authentication and Encryption

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER

IP-based Digital Audio, Video and Data Distribution

Efficient remote access to machines and plants with SIMATIC

Products and Services Catalogue

vision To be the leading satellite communications operator in the region, through our optimum user solutions and partnership approach.

Executive Summary. Page 2 of 8

IP Telephony: Reliability You Can Count On

1.264 Lecture 37. Telecom: Enterprise networks, VPN

IP Telephony Management

FibeAir I500R High Capacity Wireless Network Solution

Information Services Strategy

BGAN. Global voice and broadband data. The mobile satellite company

The Hybrid Enterprise. Enhance network performance and build your hybrid WAN

Satellite Solutions for Emergency Relief and Disaster Recovery Management. May 2009

Easy. Modular. Universal. Laboratory automation with SIMATIC PCS 7 LAB SIMATIC PCS 7. Answers for industry.

Transcription:

The portfolio of Crypto AG: comprehensive solutions for the security of your information

Crypto AG your ideal partner in security Crypto AG was founded by cryptology pioneer Boris Hagelin in Zug, Switzerland, in 1952. Ever since, we have been concentrating exclusively on developing, manufacturing and implementing custom security solutions. There is probably no user scenario that cannot be addressed by a solution from Crypto AG. As a legally and economically independent Swiss company, we are not subject to any export restrictions. In other words, we put the emphasis on your security even in our choice of business location. The portfolio of Crypto AG Your ideal partner in security 2 The unique security architecture 3 Services from Crypto AG 4 Customised solutions from Crypto AG 5 Network Security Solutions 6 IT Security Solutions 8 Office Security Solutions 9 Radio Security Solutions 10 SatCom Security Solutions 11 Years of experience To date, Crypto AG has designed and manufactured security systems in over 130 countries, always with an eye to forging long-term partnerships. Our main clientele consists of governments, foreign ministries, and diplomatic missions, ministries of interior and police stations, armed forces by land, on sea and in the air and other governmental and non-governmental organisations. Cryptographic autonomy If you need a security solution optimally attuned to your mode of operation and security policy, you will have a hard time finding it in the range of ready-made security products. What you will probably have to do is rely on an individually designed planning and implementation process that allows you to align the cryptographic and operational elements to your needs. You make yourself independent and invulnerable to attack with an encryption algorithm whose parameters you can define and control yourself. The best solution for you With Crypto AG as your partner, you can carry out your security project efficiently and on budget with no risks involved. Along with the most modern technology solutions available, we provide you with comprehensive services and efficient project management, so the systems created for you will be user-friendly. Throughout the entire life of your system, we provide you with support services to guarantee autonomous operation and high availability in each user environment. The issues you focus on in your daily work are the same ones we focus on in our search for the best solution to meet your needs. 2

The unique security architecture from Crypto AG Maximum information security is based not on individual elements but on the entirety of a comprehensive security architecture. The key components of the unique security architecture from Crypto AG are listed below. The secret, customer-specific algorithm whose major functions you can define and control yourself as the user Hardware-based encryption in its own separate security module that is separate from the ICT network The symmetric encryption process that is immune from cryptographic attacks The secure generation of keys with a hardware-based generator of random numbers The flexible algorithmic structure that allows you to form individual cryptographic groups with protected relationships Efficient security and network management that prevents errors and provides optimum support for your security policy. Security Management The security management concept for an encryption solution determines how easily, reliably and risk-free you can support and implement your security policy in actual practice. Simplicity is a pivotal criterion for success and trust. The security of the management system is guaranteed by a number of highly advanced elements: Hardware-based cryptographic processes and a centralised operational structure with multi-location capa- bilities The Security Management concept from Crypto AG User Authentication Emergency Procedures Exclusive encrypted management channels, automatic key changes and dynamic topology change (cryptographic groups) while the system is in operation Monitoring and logging functions for security parameters and network settings Powerful user authentication system and emergency procedures adaptable to different scenarios. With the computerised Security Man- agement Centre SMC-1100, you can utilise these functions with great efficiency, online or offline. Automated Key Exchange Centralised User Management Crypto Hardware Security & Network Monitoring Encrypted Management Channels Multi-Location Management Dynamic Topology 3

Services from Crypto AG: always there for you Throughout the life of your system, Crypto AG provides you with support services to guarantee autonomous operation and high availability. You can determine the scope of services in each project phase yourself: Consulting Services The first step in Consulting Services is to take stock of ICT security at your organisation. The findings are then used to devise designs for your technical and logical topology. A procedural framework based on various best practice standards helps you to implement your security policy. experts. You have the guarantee that your system will be completed on time, within budget and in full compliance with your technological and security objectives. Education Services Crypto AG has run its own in-house Crypto Academy for decades. This institution received a Premium Class rating from the International Training Center Rating organisation. Your own experts will be armed with the practical skills and know-how they need to ensure the independent operation of the systems. extent you wish, e.g. in the guise of remote support or on-site support. Or you can purchase proactive services so you do not have to resolve unexpected problems in the first place. Lifecycle Management Services Systems intended to be constantly available have to be checked and updated periodically. These efforts ensure a long service life and optimally protect your investment. Implementation Services Crypto AG remains right at your side from the initial idea to the handover of a turnkey security solution. A dedicated project manager serves as your single point of contact and coordinates work progress perfectly with your own Operational Support Services The Crypto Service Desk is your central point of contact for all questions on hardware and software issues such as maintenance, upgrades, repairs and spare parts. With CryptoCare you can expand the services on offer to any 4

Customised solutions from Crypto AG Technology and cryptography from Crypto AG have been tried and tested in the field. We have implemented a large number of security solutions worldwide to cover a broad range of scenarios. A solution for every need The security solutions from Crypto AG are deployed for all prevalent information and communication technologies. That means our range covers solutions for IP-based applications such as Voice over IP and for classic PSTN applications, for all common (broadband) network technologies, and for radio or satellite communication. As a customer of Crypto AG, you can efficiently implement security projects with professional and sustainable results in virtually every ICT environment and for all user scenarios. Full expertise from a single company Effective systems should guarantee maximum security standards yet also be easy for users to operate. An integrated combination of hardware and software is the only way to achieve this goal. We are able to develop, produce and test all security-relevant components in-house thanks to our staff of some 300 qualified and motivated employees, including scientists, cryptologists and engineers. Crypto AG is certified in accordance with international standards for all relevant quality and management systems. Our in-house development department works at the cutting edge of technological progress. That means security solutions bearing the Crypto label are absolutely state-of-the-art in terms of performance and security standards. The portfolio for your security Drawing on our experience, we enable you to implement an exclusive, end-to-end security philosophy for your various networks and applications. Upgrades keep you in step with any major technological advances that occur and ensure constant interoperability. The bottom line is that you avoid any security gaps in your flow of information whilst also cutting your operating costs. The following pages provide you with an overview of our portfolio of services. A meeting with our experts is the easiest way to find out how you can use these services to meet your individual security needs. 5

Protection for all of today s network technologies Each network technology has its own special strengths and meets different needs. Broadband communication is based on transport media such as optical fibre, microwave, copper and satellite links. Crypto AG provides security solutions for all common network technologies, protocols and bandwidths. All of these solutions have two traits in common: they guarantee maximum security and do not impair transport performances (of up to 10 gigabits per second). The configurations may be point-to-point, multipoint or multicast depending on the technology. There are no limits to network dimensions for civil or military applications. Ethernet Encryption Ethernet plays a key role in the efficient transport of data directly from local networks (LANs) into global broadband networks. With this technology, the data travel from a LAN over optical fibre rings in a metropolitan network (MAN) and beyond to global networks (WAN) with no change of protocol. Any mix of common applications can be transmitted simultaneously in point-to-point, multipoint or multicast mode. Ethernet is therefore of great interest for real-time data transmission with military users (highly redundant C4ISTAR networks), government ministries (large mix of applications) or banks (constant availability) as well as for storage scenarios. SONET/SDH Encryption SONET/SDH (Synchronous Optical Network or Synchronous Digital Hierarchy) is a tried-and-tested technology for broadband data transport over optical networks. It ensures quality of service and allows the quick addition or dropping of streams of data between core and sub-networks. SONET/SDH is especially well-suited for core networks operated by public authorities, the military and private companies such as banks and financial institutions. A Network Security highlight Ethernet Encryption HC-8555 10G 10 Gbit/s encryption performance in full duplex mode! Easy integration and minimal maintenance Simple plug-and-play operation following configuration Encryption of all transported services/applications (voice, data, video) 6

PDH Encryption PDH (Plesiochronous Digital Hierarchy) is a classic, standardised technique for the transmission and multiplexing of data. PDH can be used in connection with common transport technologies, e.g. copper lines, microwave links or satellite links. Frame Relay Encryption Frame Relay (FR) is a reliable network technology based on data packets and is used primarily for WAN applications. Its special advantage is that it makes efficient use of the bandwidth. Frame Relay is therefore frequently employed in satellite communication (VSAT). FR is also efficient when it comes to security. Your FR data packets are encrypted (at the data link layer of the OSI model) so you can protect all your transported applications automatically and reliably at the higher layers. Storage Security Solutions Storage Area Networks, or SANs, used in data centres or disaster recovery and/or data backup centres and/or that link these centres with each other generally utilise Fibre Channel (FC) technology or of late, FC over Ethernet and FC over SDH technology. Crypto AG designs individual Storage Security Solutions with scalable performance (up to 10 Gbit/s), minimal latency times and maximum availability to protect this transported data from being accessed by third parties. Network Security Solutions Ethernet Encryption HC-8550 100M Multipoint Ethernet Encryption HC-8440 1G PDH Encryption HC-84xx Family SONET/SDH Encryption HC-8441 STM-1 Ethernet Encryption HC-8552 1G Multipoint Frame Relay Encryption HC-7110 PDH Encryption HC-8420 Fractional E1 SONET/SDH Encryption HC-8544 STM-4, HC-8545 STM-16, HC-8546 STM-64 7

Secure everywhere with IP VPN solutions VPN (Virtual Private Network) is a communications process that has gained worldwide use in connection with the Internet. Technologically, IP VPN is based on the Internet Protocol (IP). Despite its name, IP is not limited to the Internet. It can also perform transportation functions in other data networks. No data is exchanged between the VPN (Virtual Private Network) and the transport network. The confidentiality, integrity and authenticity of your information remains assured at all times. Secure in tunnel mode IP VPN Encryption units from Crypto AG operate in tunnel mode protocol, a high-security method that also encrypts the original IP header so the identity of the sender and the receiver remains invisible. IP VPN Encryption units from Crypto AG cover any bandwidth requirements up to 1 Gbit/s. Along with stationary units, you can also opt for the Crypto Mobile Client, a small portable all-in-one encryption platform ideal for today s mobile style of work. A perfect choice for military C4ISTAR scenarios is the all-purpose Multi- Com Radio Encryption platform with IP mode support for seamless integration of core and edge network areas. It renders obsolete the classic distinction between strategic and tactical communication. IP VPN Encryption solutions from Crypto AG have triple-play capabilities (data, voice and video), which also makes them ideal for Voice over IP (VoIP) or Fax over IP (FoIP) and messaging applications. IT Security Solutions An IT Security highlight IP VPN Encryption HC-7845 Gigabit Version Crypto Mobile Client HC-7835 IP VPN Encryption HC-7805 Small Office Version IP VPN Encryption HC-7825 Enterprise Version & Branch Office Version MultiCom Radio Encryption HC-2650 IP VPN Encryption unit with 1 Gbit/s performance Designed for high data volume and maximum availability Protection for all applications, e.g. e-mail, VoIP, data or video Transforms every network into a secure VPN (Virtual Private Network), regardless of the LAN/WAN you use Compatible with all other IP VPN units from Crypto AG 8

Secure data and voice communication at the office Much of the information and data exchanged in office communication today is still routed over phones and fax machines. Paper or electronic files are also created and then saved on PCs or servers. Official documents are signed and stamped by hand and then sent by regular mail or e-mail. At the same time, the use of IP-based applications is on the rise. Crypto AG provides specific encryption solutions and secure workstations in which IP VPN Encryption can be integrated as an additional security function. Secure transmission of documents Whenever documents are transmitted, their confidentiality and authenticity must be assured. The new Crypto Desktop platform combines the advantages of reliable fax technology with the latest in new communication technologies. With the Fax Encryption and File Encryption applications, documents are protected, classified and saved in secure mailboxes in encrypted form. Only duly authorised individuals are allowed to access the documents. The proven Fax Encryption HC-4221 is compatible with HC-9300. Secure transmission of voice When you talk to someone on the phone, the confidentiality of the information you communicate is not guaranteed. To eliminate this risk, Crypto AG provides a compact desktop unit for practical installation and plug-and-play operation. This system guarantees endto-end encryption between two suitably equipped units, e.g. also with Secure GSM, the mobile phone solution from Crypto AG. Office Security Solutions An Office Security highlight Crypto Desktop HC-9300 PSTN Encryption HC-2203 Secure GSM HC-2423 Fax Encryption HC-4221 Crypto Ruggedised Workstation HC-6835 Encryption platform for office applications Cost-efficient Fax over e-mail solution Document classification and priority handling Secure mailboxes accessible only by authorised individuals Touch screen with simple intuitive operation Sound investment for the future thanks to the future-oriented hightech design Protection against electromagnetic radiation 9

Secure radio communication by sea, on land or in the air Nowadays, radio communication takes place in an extremely broad frequency range and with differing reaches, operating modes and bandwidths. The more universally applicable a radio security solution is the more efficient and cost-effective it will be to operate. However, there are scenarios in which simple operation under tough (front) conditions is required. Radio Encryption platforms from Crypto AG provide the optimum solution for this and virtually all other conceivable scenarios. MultiCom the all-rounder The MultiCom Radio Encryption unit is an all-rounder that guarantees maximum security transmission of voice and data over HF, VHF and UHF as well as in IP-based networks. With its broad range of accessories, the MultiCom platform can be used in any environment, from armoured vehicle to helicopter or ship. When it is combined with the new MultiCom Messenger based on the STANAG 5066 Standard, secure e-mail messaging services can be carried over radio channels. Other Radio Security Solutions Crypto Field Terminal: The complete ruggedised laptop workstation with an integrated modem plus messaging and word processing software SECOS: This COMSEC and TRANSEC security system designed for military use supports voice, data and TDMA links Multilink Bulk Encryption: This extremely robust, five-channel encryption unit geared to EUROCOM interfaces can be used even when transmission quality is greatly reduced. Radio Security Solutions A Radio Security highlight MultiCom Radio Encryption HC-2650: the all-rounder Multilink Bulk Encryption HC-7550 SECOS Airborne Radio Crypto Field Terminal HC-6830 Multiradio: can be switched to different radios and interfaces Multiband: all common frequency bands can be used Multiprotocol: compatible with military standards and protocols Multialgo: multiple algorithms can be loaded for interoperability Multitraffic: full-duplex/half-duplex transmission, synchronous/asynchronous encryption Sound investment for the future: upgradable to future network technologies 10

Mobile and stationary satellite communication solutions Communication by satellite is made possible today at low prices thanks to satellite systems like VSAT, Inmarsat/BGAN and Thuraya GSM/DSL/IP, which make available various access technologies and protocols. Satellites enable communication even in remote areas without adequate infrastructure. Crypto AG has a suitable encryption solution in its portfolio to fit whatever application is used. Deployable Secure Satellite Systems These systems are cases pre-packed with all individual components such as satellite terminal, encryption unit, terminal and accessories. They are largely pre-wired and ready-for-travel, so users can put them into operation quickly. Preconfigured systems are available that can be designed to your specification. BGAN telephony services can be used just like traditional PSTN for voice and fax communication. Inmarsat/BGAN and Thuraya DSL/IP are possible satellite communication systems suitable for IP-based applications, such as e-mail and file transfer via remote access to the corresponding IT infrastructure. Real-time applications such as VoIP, FoIP or video are possible over BGAN. Peer messaging is also possible over phone channels or data service. Unlike e-mail, which runs over central servers, peer messaging requires no server but instead operates directly between sender and receiver. BGAN or Thuraya GSM would be possible satellite communication systems in this context. Frame Relay (FR) Encryption Frame Relay Encryption protects all services and applications transported via FR protocol, a protocol often used for satellite links. SatCom Security Solutions A SatCom Security highlight Deployable Secure Satellite Systems Deployable Secure Satellite Systems Compact Phone Deployable Secure Satellite Systems IT Office RT Comms Deployable Secure Satellite Systems Compact Fax Frame Relay Encryption HC-7110 Deployable in regions without sufficient infrastructure (e.g. desert, ocean) Encrypts all applications Preconfigured and prewired solution Network-independent operation possible Configuration can also be done to your specifications, also as regards suitable satellite communication systems 11

Crypto AG To Remain Sovereign Crypto AG is your ideal partner for the efficient and secure handling of information. As a legally and economically independent Swiss company, we are not subject to any export restrictions. We have developed, manufactured and implemented customised security solutions for over 55 years. The package we offer features the latest technology solutions and comprehensive services. Throughout the entire lifetime of your system, we provide you with support services to guarantee autonomous operation and high availability whatever the user environment. You too can rely on the expertise and capabilities of Crypto AG just like our customers in over 130 countries. Crypto AG, Headquarters Crypto AG P.O. Box 460 CH-6301 Zug Switzerland Tel. +41 41 749 77 22 Fax +41 41 741 22 72 crypto@crypto.ch www.crypto.ch Crypto AG, Regional Offices Abidjan Crypto AG 01 B.P. 5852 Abidjan 01 Ivory Coast Tel. +225 22 41 17 71 Fax +225 22 41 17 73 Abu Dhabi Crypto AG Abu Dhabi P.O. Box 41076 Abu Dhabi United Arab Emirates Tel. +971 2 64 22 228 Fax +971 2 64 22 118 Buenos Aires Crypto AG Maipu 1256 PB A 1006 Buenos Aires Argentina Tel. +54 11 4312 1812 Fax +54 11 4312 1812 www.crypto.ch Kuala Lumpur Crypto AG Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights 50490 Kuala Lumpur Malaysia Tel. +60 3 2080 2150 Fax +60 3 2080 2140 Muscat Crypto AG Regional Office P.O. Box 2911 Seeb PC 111 Sultanate of Oman Tel. +968 2449 4966 Fax +968 2449 8929 A member of The Crypto Group 2009 Crypto AG CP Crypto Portfolio EN/0950