Protecting your information

Similar documents
Secure VoIP for optimal business communication

TrustWay: the high security solution

SOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

secure For the ultimate in Cyber Defence TRL Technology

Partner with the UK s leading. Managed Security Service Provider

Reaping the Full Benefits of a Hybrid Network

Intelligent Solutions for the Highest IT Security Requirements

White Paper. ZyWALL USG Trade-In Program

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Cisco Advanced Services for Network Security

Small businesses: What you need to know about cyber security

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Transportation. The road to smarter traffic monitoring with Axis network video solutions.

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

IT Security. Securing Your Business Investments

Secure Video- Conferencing using Omnisec

MPLS: an advanced and affordable private network solution

ICANWK406A Install, configure and test network security

Video conferencing just became clearer NEC conferencing & collaboration

Document ID. Cyber security for substation automation products and systems

Guideline on Auditing and Log Management

ICAB5238B Build a highly secure firewall

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Supporting voice and business-critical applications across multiple sites

WHITE PAPER. The Linksys Connected Office portfolio includes:

Small businesses: What you need to know about cyber security

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

V1.4. Spambrella Continuity SaaS. August 2

Security appliances with integrated switch- Even more secure and more cost effective

Windows Embedded Security and Surveillance Solutions

Sectra Communications ensuring security with flexibility

Using Omnisec 422 and 423 IP Encryptors Over BGAN

Cisco Cloud Web Security

Network Security Forensics

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Accessing and sending data securely across security domains

Managed Network Services

Protecting Your Organisation from Targeted Cyber Intrusion

IBX Business Network Platform Information Security Controls Document Classification [Public]

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Secure Network Design: Designing a DMZ & VPN

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Intelligent Solutions for the Highest IT Security Demands

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

DeltaV System Cyber-Security

AND Recorder 5.4. Overview. Benefits. Datenblatt

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Colt Smart Office. Flexible network services for the smaller business. / Next

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS)

Our Cloud Offers You a Brighter Future

Managed Services. Business Intelligence Solutions

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece

Network Enabled Cloud

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

2012 Endpoint Security Best Practices Survey

Bachelor of Information Technology (Network Security)

CloudDesk - Security in the Cloud INFORMATION

Unit 3 Cyber security

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

CenterMind G+ Smart and Proactive Environment Monitoring

CDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE

Simplifying advanced communications

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Industrial Security Solutions

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

MAILGUARD LIVE. Continuity. Trust the innovator to simplify cloud security

successstory Security for Diplomacy High Security for Embassy Networks

Internet threats: steps to security for your small business

Symphony Plus Cyber security for the power and water industries

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Building Secure Networks for the Industrial World

Transcription:

Protecting your information

Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost of cybercrime at 27 Billion (approximately 33 Billion) per annum in Britain alone to businesses such as software and computer services, financial services, the pharmaceutical and biotech industry, and electronic and electrical equipment suppliers. But the major damage is not just financial losses, it s the risk of losing clients, prestige and market share. Advenica offers products and services that protect your information and minimise the risks of it getting into the wrong hands. * UK Cabinet office for cybersecurity.

State-of-the-art cybersecurity solutions made in Sweden One of the top 5 European companies in cybersecurity, Swedish based Advenica produces state-of-the-art VPN encryptors, cross domain solutions, and high assurance filters and diodes. With a military DNA and heritage from working with the Swedish security services, we guarantee you optimally robust solutions. Whether you handle business or research data, patient records, corporate, national, state or EU secrets, our products and services are designed to protect your most valuable information assets. We help you ensure secure exchange of information while protecting the confidentiality, integrity and authenticity of your data. Tried, trusted, assured Put your information security management in the hands of a company recognised and awarded with the with EU s highest security certification. We are the only VPN supplier to the Swedish Top Secret organisations for the last ten years; and one of just a handful of companies approved for cryptographic products as part of the EU Classification up to, and including, SECRET UE/EU SECRET. Our encryptors have received approval for national use up to and including Swedish HEMLIG/ TOP SECRET, and NATO CONFIDENTIAL. With us, you know your secrets are safe. Secure your information, wherever you are With products and technologies deployed in more than 40 countries by organisations such as military, government agencies, law enforcement and major multinationals, we help you every step of the way in maximising cybersecurity. Using our collaboration tools, military and civil organisations, companies and organisations can rely on completely secure information exchange. Our solutions are designed to secure your data traffic, not just in Europe, but in distributed systems throughout the world. With a comprehensive parts and service/ support portfolio at your service, we guarantee the security of your information wherever you are, and whenever you communicate. Secure information on the move Police, border control officials, military patrols and customs officers often need access to secure information such as online registers, or even stream video through a mobile network. Our VPNs ensure safe information transfer, even when transmitting through an untrusted network such as the Internet.

Protecting the heart of your business Whether you handle business or research data, patient records, corporate, national, state or EU secrets, our products protect your most valuable information assets. Network encryptors When geographically scattered organisations share information and data over open networks, such as the Internet, they are facing the risk of data intrusion and manipulation. Using network encryptors you extend your protected IP networks securely over an untrusted network. By creating a secure tunnel through an untrusted network, your organisation can send classified information securely over the Internet. Our state-of-the art VPN (Virtual Private Network) encryptors meet government, military and multinational requirements for VPN security on IP-based networks. They are approved for use up to and including the EU SECRET security level in the European Union. Ranging from portable, rugged military units to solutions addressing the security needs of large, global enterprises, our encryption products are network and bandwidth compatible and are constantly optimised to meet your current and future customer security needs. Data diodes This smart, one-way information transfer device connects two networks of different security levels and allows information to be sent to the more secure network without the risk of leaking your information. A data diode ensures your operating systems, applications and anti-virus updates work on a secure network. Use it for email alerts and to safely import files from a public network like the Internet to a classified network. Cross domain security Organisations face the challenge of how to protect their most sensitive information when connecting their systems with other networks such as the Internet. Our range of high assurance filters with advanced filter functionality and data diodes help you to connect your high security and high integrity network with the outer world. Secure videoconferencing Based on Cisco s well-proven telepresence system, our SecuriVPN VTC100A is a complete, scalable cost-effective solution for secure video conferencing. Designed for the stringent security requirements of most organisations, this system fulfils formal NATO and EU standards for compromising radiation. It provides the highest possible protection against interception of communications on IP based networks. SecuriVPN VTC100A is approved to handle classified information throughout the EU. USB security If these small and inexpensive devices fall into the wrong hands, they can create huge, costly security damage within your organisation. Critical medical

systems, military systems and industrial control systems are just some of the systems attacked by viruses and malware stored on USB sticks. By using SecuriRAM, an innovative selferasing USB device, you eliminate many of the risks associated with negligent USB device usage. Accessories Get all you need from our complete range of quality acessories. Everything from power supplies to connectors, converters and mount devices to ensure your technical equipment works to the highest specifications. Keeping patient information safe Healthcare authorities, hospitals, health centre and General Practitioners can securely share confidential patient information using our VPNs. Easy to use and penetration proof, administrative personnel can manage the system without ever retrieving classified customer information.

Get wise to the risks Information security is about more than technical equipment. To achieve solid protection and safe communication you need to carefully plan your processes to get the most out of your security solution. We help you meet and surpass the security requirements you need. Information security is about more than technical equipment. To achieve solid protection and safe communication you need to carefully plan your processes to get the most out of your security solution. We help you meet and surpass the security requirements you need. Security as a Service Companies are faced with the dual dilemma of increasing demands on internal security expertise while reducing total running costs. A seemingly impossible combination. Complying with all legal and European government requirements, our 24/7 Security as a Service solutions increase security while reducing complexity in your networks. Our robust, scalable VPN systems handle any amount of traffic. And thanks to a revolutionary three domain separation solution, your service suppliers can never gain an insight into any information transmitted or received. Implementation and adaptation It s easy to integrate our flexible products into your system infrastructure. And we ll train your systems operators and administration teams to ensure swift rollout of solutions and encryption units. We ll also make sure all system configurations, management, maintenance and support are in place and working as they should. Total security made simple. After sales Keep your data and information safe, without costly downtime. Our firmware upgrade services and other modifications help expand equipment lifespan and keep it up to date with the most recent security challenges. Benefit from technical support either remotely or onsite to guarantee smooth operations. Training Raise your security awareness, operational independence and cost effectiveness. We train your staff in the efficient use of your state-of-the art security solutions, maximising your security investment. Specially designed for security officers, system administrators and end-users with varying levels of experience in cryptology, sessions cover information security principles, encryption technologies for information security, and security awareness sessions to identify threats and risks related to your operational environment. Advenica Academy Together with the Lund University Faculty of Engineering, the Advenica Academy can offer you

training in modern communication networks, security challenges, and different security mechanisms and tools. All courses can be tailored to your individual needs. Testing and evaluation By examining your security products and IT systems we can evaluate whether your built-in security mechanisms are capable of handling any hacking attempts or other types of cyber threats. We specialise in penetration testing on embedded systems. Our teams are experienced in different testing methods and the various tools an attacker might use for a specific target system. Our experts can test the following technology areas: biometric security, cryptology, data destruction, intrusion detection, intrusion prevention, malware protection, near field communication (NFC), payment systems, protocol analysis, routers and switches, smart cards, smart phones and other telecom products. Customised solutions Let us map your needs to make sure you get solutions that perfectly match your security requirements and expectations. We ll work in close collaboration with you to develop special features and products in network security and cryptography. Technical support Enjoy smooth, secure operation of your security systems. Benefit from our remote, or onsite technical support, follow-ups, maintenance, troubleshooting, repairs, and product and technology upgrades. With a customised maintenance and support agreement during and after the warranty period, you specify your own needs for support services that address security needs outside our standard service level agreement. Preventing attacks on critical utilities By implementing our secure VPNs, industrial control systems can send status and alert/alarm information without leaking sensitive information. This prevents attacks or manipulation of infrastructure, and enables the safe monitoring of surveillance cameras from a central site.

For 20 years, Advenica has pioneered communications security with state-of-theart technologies trusted to secure our customers most sensitive information. Accredited to the highest security standards by the European Union and Swedish Armed Forces, Advenica products and technologies are deployed in more than 40 countries by organisations with the most stringent security requirements: military, government agencies, law enforcement, multinational corporations and financial institutions. Today, Advenica is leading the way in cyber security, protecting critical infrastructures with our innovative solutions designed to secure organisations in the digital age. Headquartered in Lund, Sweden, Advenica has additional offices in Stockholm, The Hague and Vienna. Head office Advenica AB P.O. Box 110 65 S - 220 11 Lund SWEDEN Visiting address Advenica AB Greenhouse Stora Råby Byaväg 88 224 78 Lund Phone + 46 46 38 60 50 Fax +46 46 38 60 55 E-mail reqinfo@advenica.com Web www.advenica.com Copyright 2014 Advenica AB. All rights reserved. Advenica and the Advenica logo are trademarks of Advenica AB. All registered and unregistered trademarks included in this publication are the sole property of their respective owner. Our policy of continuous development may cause the information and specifications contained herein to change without notice. Doc. no.: 14340 v1.4