Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL



Similar documents
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

How To Protect Your Data With A Senior Security Encryptor From Being Hacked By A Hacker

data Centres solutions-paper

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

High speed Ethernet WAN: Is encryption compromising your network?

High Speed Ethernet WAN: Is encryption compromising your network?

IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NETWORK SECURITY.

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

How To Secure My Data

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

High Speed Encryption Made in Germany

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

Building A Secure Microsoft Exchange Continuity Appliance

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Technical papers Virtual private networks

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Virtual Privacy vs. Real Security

SureDrop Secure collaboration. Without compromise.

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

How To Protect Your Data From Harm With Safenet

Fiber-Optic Networks: Is Safety Just an Optical Illusion?

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

the about MPLS security

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Portable Wireless Mesh Networks: Competitive Differentiation

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

Dante: Know It, Use It, Troubleshoot It.

White paper. Why Encrypt? Securing without compromising communications

Preparing Your IP Network for High Definition Video Conferencing

Adobe Systems Software Ireland Ltd

Wireless Encryption Protection

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

BANKING SECURITY and COMPLIANCE

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

1. Securing Untrusted Layer 2 Networks The Different Processing Approaches to Implementing Network Encryption... 3

ethernet services for multi-site connectivity security, performance, ip transparency

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

The Education Fellowship Finance Centralisation IT Security Strategy

Who s next after TalkTalk?

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Enterprise Business Products 2014

Get Better Protected... Secure data sharing made possible with Updata s Encryption Overlay Service.

FibeAir I500R High Capacity Wireless Network Solution

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

RFC 2544 Testing of Ethernet Services in Telecom Networks

WAN and VPN Solutions:

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

TCP/IP Network Communication in Physical Access Control

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Preparing Your IP network for High Definition Video Conferencing

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

TrustWay: the high security solution

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Security Issues with Integrated Smart Buildings

Security and Risk Analysis of VoIP Networks

EasiShare Whitepaper - Empowering Your Mobile Workforce

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

How To Protect Your Data From Being Hacked

The evolution of data connectivity

we secure YOUR network we secure network security English network security

USER-MANAGED FILE SERVER BACKUP:

A practical guide to IT security

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

isheriff CLOUD SECURITY

A HELPING HAND TO PROTECT YOUR REPUTATION

SytemsInsight QUICK REFERENCE GUIDE. Going further in critical communications

TrustNet Group Encryption

Bootstrapping Secure Channels of Communication Over Public Networks

BSNL IDC Hosted Firewall Service. Total Network Security

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

YOUR CANADIAN CONNECTION

The Next Generation Network:

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Gold Lock Desktop White Paper

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Transcription:

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED TO PROTECT SENSITIVE NETWORK DATA BY COMMERCIAL, INDUSTRIAL AND GOVERNMENT ORGANISATIONS IN MORE THAN 20 COUNTRIES. Our defence-grade network data encryptors are specialist products dedicated to protecting the most sensitive information being transmitted across communications networks - without compromising valuable network performance. Senetas hardware encryptors provide commercial and industrial organisations the exceptional peace of mind of multiple independent, international testing authorities certifications as suitable for government and defence use. MAXIMUM DATA PROTECTION WITHOUT NETWORK COMPROMISE Our product certifications assure commercial and industrial customers that even the smallest changes to Senetas encryptors are subjected to thorough independent expert evaluation. Recognised as leading encryptors of their type, Senetas certified hardware encryptors are used by commercial and government organisations in more than 20 countries to protect their sensitive data, including: Cloud computing Big Data Data centres CCTV networks Industrial management and control systems. Our encryptors protect data from potentially devastating data network breaches cyber-crime and attacks: Eavesdropping Data theft Input of rogue data Innocent human and technical errors. Senetas certified encryptors provide the critical last line of defence. Our robust high-speed encryption technology ensures that unauthorised parties who successfully breach data networks only obtain meaningless rubbish. They also overcome security and performance weaknesses of other products: Significant loss of data network performance Exposure to technology vulnerabilities. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 2

BEST PERFORMANCE TRUSTED ASSURANCE SIMPLICITY Our customers transmit highly sensitive data across a wide range of data networks from complex global to simple point-to-point networks. Independent, international government testing authorities certifications are just as important to commercial and government organisations around the world. They certify the encryptors performance. Our customers benefit from the exhaustive independent testing authorities product certifications thorough and on-going processes of performance evaluations. And all three leading international certification authorities FIPS, Common Criteria and CAPS have certified Senetas encryptors. This is a performance standard unmatched by any other manufacturer! Senetas encryptors ensure that best data protection need not come at the heavy cost of reduced network performance. They enable maximum data network performance through their designed-in zero-latency, zero-overhead and zero network impact. They are also as simple to install and manage. NETWORK BREACHES RISKS OF CATASTROPHIC DAMAGE Serious data network breaches include: Data sniffing, eavesdropping, theft and privacy breaches Redirection of data Cyber-attacks and damage to data integrity Human errors and systems and hardware failures e.g. incorrect network configuration Input of damaging rogue data New technologies delivering efficiencies to government organisations transmit large volumes of data that make even small network breaches potentially catastrophic: Loss of trust and reputation - breach of privacy and identity theft Financial losses, compensation costs, regulatory penalties Theft of intellectual property and damage to data integrity and critical infrastructure. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 3

WHY ENCRYPT SENSITIVE NETWORK DATA? DATA NETWORK BREACHES HIGHLIGHT THE IMPORTANCE OF PROTECTING THE DATA ITSELF. CERTIFIED ENCRYPTION HARDWARE DEDICATED TO DATA SECURITY - IS THE ULTIMATE DATA PROTECTION. CLOUD, DATA CENTRE, BIG DATA AND OTHER TECHNOLOGIES NEED THE BEST DATA PROTECTION AND MAXIMUM NETWORK PERFORMANCE. The need to protect any organisations sensitive information within their systems is clear. But, the need to protect transmitted network data has not been so obvious. Leading data security organisations highlight that many organisations do not sufficiently protect network data once outside their direct control. Who really knows what happens to their data while transmitted to another location? Network data is easily and cheaply monitored, tapped, stolen, tampered with and redirected by cyber-criminals. In its 2012 Global Data Security Report, awarded information security experts Trustwave noted that 62.5% of data theft occurred while in transit. It also pointed to increasing cyber-criminal focus on data in transit. Furthermore, data travelling through networks is not just exposed to risks of cyber-attack; there are also genuine risks of transmission to wrong locations. Human error and technical equipment failings are real risks that can manifest more often than you would think. The common issue that organisations face is a breach of data privacy and/or integrity as well as criminal damage such as the loss of valuable intellectual property, whatever the original cause. However, these risks can be eliminated - and security assured - by automatically encrypting the data while it s in motion. Your network data commercial, government or industrial data, voice, video, or all three should be encrypted to protect your organisation and its stakeholders. Importantly, data security advisors highlight that almost all network data should be encrypted. They argue that in large volumes, even low value data, when aggregated, can be useful to cyber-criminals and any network breach has potential to be harmful to reputations and stakeholders trust. In the past, data encryption came at a huge cost of network performance due to latency and encryption overheads. Senetas then developed zero-latency encryptors with zero overhead and impact on network assets maximum network performance and maximum data protection. Two serious network breach issues have been identified by data security analysts the seemingly harmless breach today may be very harmful in the future; and that most breaches remain undetected in the long-term. Australian manufacturer, Codan Ltd., only became aware of an earlier network breach when it discovered the theft of its products intellectual property, which had led to a massive decline in market share due to counterfeiting reported to it by its dealers years later. It s often assumed that data networks are safe. The reality is they are not. Cyber-attacks, human error and equipment failings are all hazards that can lead to sensitive data getting into unauthorised hands. Ultimately, it s the encryption of data that provides genuine assurance that the encrypted data is useless to unauthorised parties the last line of defence. The optimal solution is not the protection of the data network; it s the protection of the data itself. By encrypting the data, you can be assured that however accessed by an unauthorised party, it is protected by that last line of defence. This is why governments and defence forces around the world have encrypted information for hundreds of years. Typically, data networks used to transmit information are known as Layer 3, but when you encrypt Layer 3 networks, it s at a serious cost of 50% to 70% of network performance. On the other hand, Layer 2 networks do not suffer the same lost performance. They are used when high data volumes and performance needs demand more bandwidth and improved cost efficiency, together with best practice data security. WHO WOULD EMAIL OR POST UNENCRYPTED SENSITIVE DATA? WHO WOULD LEAVE UNENCRYPTED SENSITIVE DATA ON A LAPTOP? SO, WHY WOULD ANYONE EVER TRANSMIT UNENCRYPTED SENSITIVE DATA ON A NETWORK? VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 4

CERTIFICATIONS YOUR ASSURANCE OUR COMMITMENT SENETAS ENCRYPTORS ARE PREFERRED BY THE WORLD S MOST SECURE COMMERCIAL, GOVERNMENT AND DEFENCE ORGANISATIONS. ONLY SENETAS ENCRYPTORS HOLD ALL THREE LEADING INTERNATIONAL, INDEPENDENT, AND GOVERNMENT TESTING AUTHORITY CERTIFICATIONS. Senetas customers are assured of our encryptors leading performance by the certifications provided by the leading testing authorities. These certifications involve years of rigorous testing by the testing authorities own labs. They are certified as suitable for government and defence use providing commercial and industrial customers with maximum assurance comfort. Senetas all-australian developed and manufactured defence-grade encryptors provide all our customers the best assurance that their network data is protected by the rigorous independent testing authority standards and perform as specified. In addition to our encryptors certifications, many commercial customers have also undertaken their own proof of concept and even benchmarking testing. In every case, Senetas encryptors have excelled. All Senetas customers benefit from triple certification assurance because our encryptors include the only products of their type in the world to be certified by all three leading testing authorities, rather than just one. Commercial and industrial customers know that only Senetas hardware encryptors have also been certified international and independent testing authorities. Our customers are also assured of maximum network performance. Our product certifications are: Federal Information Processing Standard (FIPS) - United States Common Criteria (international and Australia) CESG Assisted Products Service (CAPS) UK. To provide their stakeholders with a preferred level of security performance assurance, many commercial organisations have followed government certification requirements. They insist that products used to protect their sensitive data hold one or more of these independent certifications. ENCRYPTION WITHOUT COMPROMISE SENETAS R&D COMMITMENT Whether protecting data transmitted for Cloud computing; remote data centre services; information-rich Big Data (multicast); CCTV traffic; or, infrastructure and industrial process and control systems; independent testing authorities certifications are valuable security and performance assurance. That is why Senetas has always been 100% committed to testing authorities certifications. Ultimately, all Senetas customers are assured that when their networks are successfully breached, the data will be useless to unauthorised parties. Importantly, commercial organisations providing services to the government and defence sectors such as Cloud computing or data centre storage services will meet the certification requirements required of their government customers when using Senetas encryptors. That s why Senetas encryptors secure much of the world s most sensitive data! NOT ALL ENCRYPTION SOLUTIONS ARE THE SAME. DATA NETWORK EVESDROPPING AND SUCCESSFUL BREACHES PROVE THE VALUE OF TESTING AUTHORITY CERTIFICATIONS. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 5

SECURITY WITHOUT COMPROMISE! Best Performance Trusted Assurance Set and Forget HIGH-SPEED The designed-in market-leading performance capabilities make Senetas encryptors stand out. Whether 10Mbps, 100Mbps, 1Gbps or 10Gbps, they hands-down win competitive performance tests - every time! Their encryption speeds; near-zero data overhead; near-zero latency; and their consistent performance make Senetas encryptors ideally suited to the most demanding environments. They are preferred by many of the world s most secure organisations. ZERO LATENCY Senetas high-speed encryptors are operate in full-duplex mode at full line speed without loss of packets. Latency is not affected by packet size (approx. >4 microseconds per unit at 10Gbps) meaning maximum throughput with zero protocol overhead. Importantly, by using Field Programmable Gate Array (FPGA) technology, this outstanding latency performance is predictable and dependable. ZERO IMPACT The zero impact of Senetas encryptors is not limited to network bandwidth and speed (latency). It extends to network operations and management. They simply fit in within the user network. They don t require changes to other devices or network reorganisation. Zero impact makes Senetas encryptors a favourite among network engineers - they don t add load to network operations or management. FLEXIBILITY Senetas encryptors use of FPGA technology enables maximum operational flexibility. They better meet customers specific and unique requirements and provide an optimised high-speed data encryption solution. This multipurpose flexibility enables on-going operational simplicity, such as infield upgradability, as customers requirements change protecting their investment. It also enables unique capabilities such as implementing custom algorithms. TRIPLE CERTIFIED Because Senetas encryptors include the only triple-certified products of their types, they are trusted by governments and defence forces around the world. This exhaustive and rigorous testing over many years provides our government and commercial customers with maximum assurance. Senetas encryptors are certified by: FIPS, CAPS and Common Criteria. RELIABILITY Senetas encryptors are designed, developed and manufactured in Australia to exacting standards. In addition to the high levels of security, they provide reliable 99.999% uptime and conform to international requirements for safety and environment. COMPREHENSIVE RANGE The Senetas CN range of Layer 2 encryptors provides the widest feature-set able to operate at 10Mbps to 10Gbps support Ethernet, Fibre Channel; SONET/SDH and LINK protocols. This extensive range provides costeffective network-wide data protection. COST EFFECTIVE Senetas encryptors provide excellent total cost of ownership through a mix of: network bandwidth savings; ease of network management; longevity; reliability; interoperability; backward compatibility; minimal installation and management costs and solution flexibility. Other cost benefits include: low power consumption; minimal rack space use and combined rack space/power utilisation efficiency. CUSTOM ALGORITHMS In addition to the AES 256 bit algorithm, Senetas encryptors may be implemented with alternative, customer requested algorithms. SOLUTION INTEGRITY Senetas encryptors provide maximum solution integrity and the highest data protection investment return. SIMPLICITY Set and forget and transparency are underlying Senetas design themes. They help ensure simplicity of implementation, operation and management low cost. That simplicity continues with an intuitive user interface providing meaningful descriptive diagnostics such as early warnings and simple faultfinding. They just do their job with minimal resource requirements. EASY TO INSTALL The Bump in the Wire design of Senetas encryptors makes them easy to install. Simply place the encryptor at the access point to the Layer 2 network and all data passing through the unit is encrypted using an AES 256 bit encryption algorithm. ALL TOPOLOGIES Senetas encryptors operate in multipoint to multi-point (mesh); singlepoint to multi-point and single-point to single-point network topologies. Whether the network topology is simple or very complex the same Senetas encryptor benefits apply. INTEROPERABILITY Senetas encryptors that support the same protocol are fully interoperable. All Senetas CN models are backward compatible and provide the lowest network impact and overhead. LOCAL OR CENTRALISED MANAGEMENT Configuration can be performed locally or remotely through the intuitive Senetas CM7 management software, which acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates. R&D COMMITMENT Senetas s market-leading highspeed encryption results from its R&D commitment - to independent international testing certifications and high-speed encryption advances, such as support for Quantum Key Distribution. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 6

NETWORK TOPOLOGIES SENETAS ENCRYPTORS ARE DESIGNED TO MEET THE NEEDS OF COMMERCIAL AND INDUSTRIAL ORGANISATIONS. THEY SUPPORT ALL DATA NETWORK TOPOLOGIES AND DATA SPEEDS FROM 10MBPS TO 10GBPS. POINT-TO-POINT CONNECTIONS In the case of simple business and data network operations, such as one office to another, Senetas encryptors protect data transmitted between network links at two locations via a fibre link or a managed Ethernet connection. This direct transmission of encrypted data between the two locations is a point-to-point solution. POINT-TO-MULTIPOINT CONNECTIONS In the case of multiple locations such as branch offices connected to a single central head office site; the point-to-multipoint connections may be used. The branch locations may exchange data with the head office and optionally among each other. The access speed and the encryption for each site may vary and be chosen among 10Mbps, 100Mbps, 1Gbps or 10Gbps. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 7

MULTI-POINT CONNECTIONS Where there are many locations that communicate freely among each other, this is referred to as a multi-point or mesh environment. Hence a full multi-point solution may be optimal. Such a full multipoint solution looks similar to a large distributed LAN where all encryptors see each other at Layer 2. Similar to the point-to-point and point-to-multipoint connections, Senetas encryption does not have any impact on the network functionality nor other network assets, thus allowing all services including multicast and broadcast applications to continue to operate unaffected. DATA STORAGE INTERCONNECTION Senetas encryptors also support the encryption of data transmitted between and among multiple data storage networks. The combination of the SONET/SDH encryptors and TDM multiplexors allows the encryption of data transmitted across links between and among multiple data centres. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 8

ABOUT SENETAS SENETAS IS AN ALL-AUSTRALIAN COMPANY, SPECIALISING IN CERTIFIED NETWORK DATA PROTECTION HARDWARE - ENCRYPTING NETWORK DATA WITHOUT COMPROMISING NETWORK PERFORMANCE. Senetas uniquely designs, develops and manufactures in Australia. Senetas certified high-speed encryptor hardware has leading performance characteristics and is trusted by commercial, industrial, government and defence organisations around the world to protect their sensitive data. These customers include highly secure organisations such as the US government and defence forces; Swiss banks, regulatory bodies and global financial transactions processing organisations. Senetas encryptors protect: commercial and industrial intellectual property (IP); customer privacy (B2C and B2B); business financial transactions and identity data; government information and secrets; Cloud computing services; data centre traffic; CCTV networks; and infrastructure process and control systems. Senetas has won numerous awards for technology innovation and its benefits. OUR COMMERCIAL CUSTOMERS Senetas customers include the following types of organisations in more than 20 countries: Commercial and industrial organisations that adopt certification requirements - Common Criteria (international), FIPS (US) and CAPS (UK). Global Cloud computing service providers Financial institutions; Swiss and other banks; insurers Global financial transactions processing organisations, e.g. SWIFT Telecommunications carriers and data networks services providers. National Cloud computing and data centre service providers. Large professional practices e.g. Multi-office law firms Government agencies law enforcement, defence and military, service agencies, regulatory bodies, etc FURTHER INFORMATION SENETAS ENCRYPTOR TECHNICAL INFORMATION AND SPECIFICATIONS ARE AVAILABLE AT: WWW.SENETAS.COM There are a number of downloads available on the Senetas website, which provide facts about network data threats and Senetas certified encryption hardware solutions. WWW.SENETAS.COM Downloads include: White-Papers Solutions-Papers Case-Studies. VISIT WWW.SENETAS.COM FOR A RANGE OF DOWNLOADABLE DOCUMENTS 9