MultiCom Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions



Similar documents
Secure telephony via classic and IP networks. office security solutions

Secure telephone communications with Voice over IP from Crypto AG

Fax Encryption HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions

High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks

The portfolio of Crypto AG: comprehensive solutions for the security of your information

Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS

Security & Surveillance Cabling Systems

SkySweep Technologies

Overview of NATO Technology Trends

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

NEXIUM SAT. Satcom systems solutions

Storage Area Networks (SANs) and iscsi Protocol An Introduction to New Storage Technologies

RC:

SytemsInsight QUICK REFERENCE GUIDE. Going further in critical communications

R&S RNMS3000 Radio Network Management System Utilization planning, radio network configuration and data distribution

8-Port 10/100Mbps 802.3at PoE + 1-Port 10/100/1000Mbps Desktop Switch

Technical Glossary from Frontier

Mercury overview.

Power over Ethernet technology for industrial Ethernet networks

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

IP-based Digital Audio, Video and Data Distribution

Convergence: The Foundation for Unified Communications

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

WHITE PAPER. Secure Cellular Push-to-Talk to Land Mobile Radio Communications

TAXONOMY OF TELECOM TERMS

Portable Wireless Mesh Networks: Competitive Differentiation

Secure information exchange

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008


Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

TOTAL RECALL MAX Potential Connection Diagrams CALL RECORDING. Product Specifications YOU NEED TOTAL RECALL MAX

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Allstream Converged IP Telephony

Communication for Mining Sites

Challenging Communication Boundaries. Dispatch Solutions for VoIP Networks

R&S Postman III Radiocommunications system for stateof-the-art. data transmission. Product Brochure Secure Communications

VOIP-BASED VOICE COMMUNICATIONS CONTROL SYSTEM

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Introducing HF 2000 in the Swedish Armed Forces

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

Mobility and cellular networks

Hosted vs On-Site IP-PBX A Guide for SMEs

Satellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA,

VoIP for Radio Networks

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

Partner with the UK s leading. Managed Security Service Provider

Using the Omnisec 525 fax encryptor over BGAN

IP Video Surveillance

Toll-bypass Long Distance Calling What Is VOIP? Immediate Cost Savings Applications Business Quality Voice...

SECURE COMMUNICATIONS Crypto products

NGN Network Architecture

Values Customer Satisfaction: It is our personal responsibility to satisfy and strive to exceed the expectations of our customers

Secure VoIP for optimal business communication

BGAN. Global voice and broadband data. The mobile satellite company

NXU RoIP Link to Eliminate Voice-Grade Leased Line

Emerging Wireless Technologies

SIP TRUNKING THE COST EFFECTIVE AND FLEXIBLE ALTERNATIVE TO ISDN

SIP Trunks. The cost-effective and flexible alternative to ISDN

Nationwide WAN + VoIP connectivity

A Model-based Methodology for Developing Secure VoIP Systems

BMS Digital Microwave Solutions for National Security & Defense

Cable TV Headend Solutions

FibeAir I500R High Capacity Wireless Network Solution

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Telephony Fundamentals

Data Transmission. from one person or place to another. person or place to another of passing something

Advanced Higher Computing. Computer Networks. Homework Sheets

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Failsafe WAN, VoIP, IVRS & LAN connectivity

Voice over IP Basics for IT Technicians

TELECOM HF VHF UHF over IP

C Information Systems for Managers Fall 1999

Intelligent Solutions for the Highest IT Security Demands

Carrier Ethernet: New Game Plan for Media Converters

R-Win. Smart Wireless Communication Management System

Reliable Security Solutions

UAV Data Links Present and Future. Broadband Satellite Terminal (BST)

convergence: preparing the enterprise network

why fixed.plan? We only connect to Tier 1 partners, including Openreach, BT and Talk Talk Business, ensuring a robust and reliable service.

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

TCP/IP Network Communication in Physical Access Control

OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS

Secure VPN access at any time. Industrial Firewalls with mobile networks

1. What is VoIP/ IPT?

Voice over IP (VoIP) Basics for IT Technicians

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

About IHM VoIP. Description of IHM VoIP enabled products and protocols used.

WiMAX technology. An opportunity that can lead African Countries to the NET Economy. Annamaria Raviola SVP - Marketing and Business Development

Appendix A: Basic network architecture

Mobile Access Controller

Technical papers Virtual private networks

Transcription:

Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions

Your technological challenge: inhomogeneous networks homogeneous information security Nowadays we see rapid advances in network and communication technologies on the one hand, and changes in user requirements on the other. Individuals with budgetary and operational responsibility in these areas have to cope with complex structures and processes: Networks are becoming ever more universal and flatter; the lines between core and edge areas, ever more blurred. Military organisations as well as governments, ministries, public administration and other civil authorities are using the same networks ever more frequently. Mobile and portable equipment is used more and more as all applications (phone, e-mail, data access, messaging, etc.) are expected to be available at any time. This philosophy of having everything everywhere at any time has given rise to a dense, inhomogeneous mix of radio/wireless, copper, fibre optics and satellite networks. Classic applications such as radio/ wireless, analogue telephony, fax, messaging (civilian and military versions) are competing with IP-based applications (voice, data, messaging, video). One trend that can be seen in the future is the convergence of classic applications to create triple-play IP ( IP convergence ). Inhomogeneous networks are complex to operate for network providers and system managers alike, particularly where sensitive data have to be protected at the same high level of security, regardless of how they are communicated. As a system or security manager, your task is to ensure homogeneous information security in inhomogeneous networks. You have two options: You can purchase application-specific solutions today and accept the fact that they will later have to be converted to IP. Or you select a universal encryption system with integrated IP mode and unified security architecture. With this second option, you have a simple solution that will withstand any technological changes that may occur over the next decade. 2

An ingenious encryption platform: fits any scenario and masters any application The encryption platform opens up new dimensions of efficient, homogeneous information security for you. It is a compact, robust and combatready unit that protects multiple applications (including IP). It creates end-to-end homogeneous information security in complex and inhomogeneous networks. It simplifies installation and operation. It accommodates future advances in technology with no trouble and at minimal expense! Different network technologies are no problem either. The platform can be connected to wire networks, Ethernet, radios and satellite terminals and can protect applications in the appropriate mode. The platform can be upgraded, thus has the potential of accommodating further applications and interfaces. Your investment is protected even if major technological advances do occur. Small and robust, this unit can be used as a stand-alone solution or can be integrated in command and control systems. It is militarily combat-ready and supports tactical as well as strategic scenarios, e.g. at headquarters, in command vehicles or in tanks at the front. The comprehensive Security Architecture from is used in all applications. The central Security Management can manage multiple applications, too, thus reducing the complexity of your ICT while increasing operational efficiency and minimising staff expenses. All encrypted applications are compatible with other encryption units of the same application from. Direct, secure communications across all borders become reality for you! PSTN/ISDN HF V/UHF SAT IP Voice NB NB/WB VoIP Data x x x x x Messaging x x x x x Video still still live live The matrix shows which encrypted applications can be run using which communication technologies. x = generally secure connection, NB = narrowband, WB = wideband, VoIP = Voice over IP, still = transmission of still pictures, live = transmission of live video. 3

Information security: just a matter of configuration for you now... HC-2650 offers you enormous flexibility, which you can use for voice and data applications in military and civilian operational scenarios, for different frequency bands and for all common radios. Application Package voice Legacy HF radios: with the integrated modem, you can establish encrypted connections over an analogue narrowband interface in voice quality of up to 2.4kbps even under extremely poor HF (VHF) conditions. Modern HF radios with hopping capabilities: this application is activated via a digital interface for up to 2.4 kbps. That means security can be provided for even the most modern EPM radios without restricting their properties. That means end-to-end security can be achieved even in mixed networks. Legacy V/UHF radios: besides the narrowband analogue interface, there is also a wideband interface available which fully supports the properties of older units and delivers excellent voice quality. Modern V/UHF radios with hopping capabilities: with this additional digital interface, EPM properties can be used (as in HF radios). If both types of interfaces are combined, encrypted connections can be established from one type of network to another (e.g. SINC- GARS to JAGUAR to FALCON, etc.). Application Package data Synchronous/asynchronous data communications: possible with no further adaptation over all radios and satellite systems (up to 128 kbs), also for (military) messaging applications such as ACP-127, STANAG 5066 and 4406. Automatic Link Establishment, ALE: compatible with systems such as MIL- STD 188-141A and FED-STD 1045. IP VPN Application Package Data: link and end-to-end encryption of large quantities of data even end-to-end all the way to the mobile subscribers on the edge of networks (e.g. command vehicles). Voice over IP (VoIP): also possible between civilian and military organisations thanks to technological compatibility. Messaging over IP: various high-security civilian and military messaging functions can be implemented. Video over IP: image and video are transmitted with no risk of tapping! HC-2650 is also available in individually configured versions for civilian or technically simple user profiles. 4

in an IP network scenario links via satellite, LAN and public transport network with triple play application Satellite Naval Force SAT Terminal Reconnaissance Vehicle SAT Terminal Laptop Server Video Camera SAT Terminal Encryption Laptop Phone Transport Network in a classic radio scenario with voice and messaging applications Satellite HF/VHF/UHF Crypto Field Terminal Modem Radio V/UHF Switch Crypto Field Terminal Modem Satellite Reconnaissance Vehicle Search and Rescue Boat Radio HF Modem Crypto Field Terminal Radio V/UHF Radio Encryption 5

Integration? Only the hard facts count here! Security experts know what ultimately counts in actual practice: Encrypting means integrating! The platform is unique in this respect, too: Multienvironment: mechanically and climatically robust, NEMP immune, EMC design (for detailed information on military standards, please refer to data sheet) Multiconnect: connects to all common types of military radios (over one hundred types tested) and modems Multiintegration: single application (mobile) or rack installation, e.g. for integration in C4I systems with automated functions such as selection of channels, operating modes, etc. (for example, for field command posts, war rooms on ships or surveillance aircraft) Multiband: all common frequency bands can be used (HF, VHF, UHF, SHF, SAT); both for fixed network technologies and for Ethernet, PSTN, and ISDN Multimode: encryption in analogue and digital modes (different bandwidths) and IP VPN mode with tunnel mode protocol (option: transport mode protocol) Multiprotocol: compatible with military standards and protocols for operation in specific networks, e.g. 5066/4406, etc. Multitraffic: simplex, half-duplex and full-duplex transmission, synchronous/asynchronous encryption, frequency hopping supported Multicompatibility: compatible with all equipment in the secure IP VPN family from, great potential for upgrades/updates (P3I=Pre-Planned Product Improvement), compatible with predecessor mode 265 Multicontrol: local or remote control, specific or integrated in C&C system Multialgo: multiple algorithms can be loaded to ensure interoperability with other sub-networks. Exclusively developed national algorithms are available as an option...defends your sovereignty in all networks: HC-2650 6

Network risks will never threaten your sovereignty Thanks to the comprehensive Security Architecture from, Multi- Com HC-2650 excels in meeting the military requirements for information security and provides maximum protection for each of your applications and each technology. The most important elements of the Security Architecture from Crypto AG are as follows: Your own secret cryptographic base, whose parameters your security manager can modify at any time without affecting security. Encryption with your secret symmetrical algorithms, kept secure from attack in a tamper-proof hardware encryption module. Flexible algorithm structure that allows you to form individual cryptographic groups with protected relationships (overlapping/hierarchical). Emanation-proof design of the encryption unit (EMC/EMV/NEMP design and internal red-black separation). Ultra-secure security management (central/decentralised, offline/online) that guarantees maximum security in the definition, management and distribution of your security data. The data are stored encrypted and separate from the network and are protected against access. You can manage multiple networks independently using the same management infrastructure, a feature that reduces investment and staff costs substantially. National algorithm blue National blue Ships with their national algorithm plus the allied algorithm National algorithm green Allied National green 7

To Remain Sovereign is your ideal partner for the efficient and secure handling of information. As a legally and economically independent Swiss company, we are not subject to any export restrictions. We have developed, manufactured and implemented custom security solutions for over 55 years. The package we offer features the latest technology solutions and comprehensive services. Throughout the entire lifetime of your system, we provide you with support services to guarantee autonomous operation and high availability whatever the user environment. You too can rely on the expertise and capabilities of just like our customers in over 130 countries., P.O. Box 460 CH-6301 Zug Switzerland Tel. +41 41 749 77 22 Fax +41 41 741 22 72 crypto@crypto.ch www.crypto.ch, Regional Offices Abidjan 01 B.P. 5852 Abidjan 01 Ivory Coast Tel. +225 22 41 17 71 Fax +225 22 41 17 73 Abu Dhabi Abu Dhabi P.O. Box 41076 Abu Dhabi United Arab Emirates Tel. +971 2 64 22 228 Fax +971 2 64 22 118 Buenos Aires Maipu 1256 PB A 1006 Buenos Aires Argentina Tel. +54 11 4312 1812 Fax +54 11 4312 1812 www.crypto.ch Kuala Lumpur Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights 50490 Kuala Lumpur Malaysia Tel. +60 3 2080 2150 Fax +60 3 2080 2140 Muscat Regional Office Seeb PC 111 Sultanate of Oman Tel. +968 2449 4966 Fax +968 2449 8929 A member of The Crypto Group 2008 CP EN/0821