Secure telephony via classic and IP networks. office security solutions



Similar documents
MultiCom Encryption The only encryption platform that can defend your sovereignty in all networks! Radio security solutions

Secure telephone communications with Voice over IP from Crypto AG

Fax Encryption HC-4221 / HC-4221C. Provides Maximum Protection for your Fax Communication Needs. Office Security Solutions

High-speed Encryption from Crypto AG: Secure Communication via Broadband Networks

The portfolio of Crypto AG: comprehensive solutions for the security of your information

Secure voice and data communication on every wavelength. Crypto AG. RADIO SECURITY SOLUTIONS

BT Hosted IPT (VoIP)

Secure Video- Conferencing using Omnisec

SytemsInsight QUICK REFERENCE GUIDE. Going further in critical communications

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

Australian Satellite Communications CREDIBLE. RELIABLE. FLEXIBLE.

Intelligent Solutions for the Highest IT Security Requirements

M I T E L IP Desktop

Intelligent Solutions for the Highest IT Security Demands

THE BUSINESS CASE FOR MANAGED SERVICES IN SMALL AND MEDIUM-SIZED BUSINESSES

successstory Security for Diplomacy High Security for Embassy Networks

Using Omnisec 422 and 423 IP Encryptors Over BGAN

MITEL IP Communications Platform

In this Profile. USA Tel: Fax:

AND Recorder 5.4. Overview. Benefits. Datenblatt

Networks, communication and telematics.

Cisco Unified Workforce Optimization for Cisco Unified Contact Center Express

vision To be the leading satellite communications operator in the region, through our optimum user solutions and partnership approach.

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

BGAN. Global voice and broadband data. The mobile satellite company

Return on Investment With Voice Over IP Linda Mills Vice President, Voice Applications MCI

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Linexcom Sdn Bhd. ict Group of Companies ver1.2

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

TrustWay: the high security solution

Advanced Business Communications for IP Networks. A Converged IP Platform offering advanced business solutions for single or multi-site networks.

KUDELSKI SECURITY DEFENSE.

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services

NEC Cloud Collaboration A simple four-step process to your ideal, cloud-based unified communications and collaboration solution.

Colt VoIP Access Colt Technology Services Group Limited. All rights reserved.

Invest in First Class communication. With profits. HiPath Hotel.

Using the Omnisec 525 fax encryptor over BGAN

Crystal Gears. Crystal Gears. Overview:

Managed Network Services

Migration from TDM to IP in Public Safety Environments: The Challenge for Voice Recording

secure For the ultimate in Cyber Defence TRL Technology

Cisco IP Communications Express: Cisco Unified Callmanager Express with Cisco Unity Express

Prepared for tomorrow s challenges with your global full service partner

SALES & MARKETING TRAINING COURSES OCT-15

> ASSISTING TO GROW BUSINESS > OUTSOURCING OPERATIONS

Introduction Insurance Industry Overview and Major Trends

Begin using tomorrow s security features today.

ComUnity. Move your organization s telephony from servers to service

How To Make A Cell Phone Converged Into A Cell Network

Unified Communications:

HOSPITALITY SOLUTIONS

HNOLOGY IN POLICING SECURITY & CYBERSPACE SITUATION

Network Assessment Services

Cisco Mobile Network Solutions for Commercial Transit Agencies

NEXIUM SAT. Satcom systems solutions

MITEL Network Communications Solutions

Secure VoIP for optimal business communication

mototrbo TM application developer programme join our community

MICROSOFT LYNC SOLUTIONS. Unifying Communications with the Active Communications Solution

PRICE LIST (EUR) July 2015

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

VIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD

Honeywell Enterprise Buildings Integrator. Maximise productivity, compliance and flexibility while reducing costs and risk

How To Choose A Hosted Voice Over Ip (Voip) Solution

Succession Solutions. Voice over IP enabled Meridian

SOPHISTICATED COLLABORATION MADE SIMPLE. TELSTRA ivision AUDIO VISUAL ROOM SOLUTIONS

Submission by the Asia Pacific Carriers Coalition

Crystal Innovation Solution 16 Moshe Shapira St., Rishon Le-Zion, 75704, Israel Crystal Gears

FAQs.... on the topics of security, availability and cost effectiveness of the innovaphone PBX. English

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Cisco IOS Voice XML Browser

Protecting your information

FibeAir I500R High Capacity Wireless Network Solution

Introducing VEGA. Communications made easy. Video Communications. Skype For Business & Collaboration. Audio Visual Solutions

How to choose the right IP gateway for your VoIP migration strategy. Deployment note

VoIP: The Wireless Revolution

RETAIL COMMUNICATIONS

SBL Integration, Capabilities, and Enablement in Defence

INFORMATION COMMUNICATION TECHNOLOGY PLAN

Efficient evolution to all-ip

How To Protect Your Data From Harm With Safenet

Transcription:

Secure telephony via classic and IP networks office security solutions

Every kind of telephone technology has its information risks... Telephone conversations are still a core function of daily communications where confidential information is at risk and has to be protected against third-party access. Or can you, in your position of responsibility, afford to let your telephone conversations be intercepted by third parties? With the vast range of options of new communication technologies, the risks posed by voice communication are all too easily forgotten. However, information security must be ensured everywhere and at all times regardless of the technology being used. Even though IP is becoming the base technology for voice communication, classic telephone networks ( and ) are still used in parallel. The challenge therefore lies in the smooth implementation of high-security encryption solutions for every kind of telephone technology and in increasingly complex and inhomogeneous networks. Special attention should also be paid to secure transitions in the implementation of continuous networks. Professionally implemented, such solutions provide reliable protection against interception, are available everywhere via fixed networks, and Satcom, and can be operated without any specialist security knowledge. solutions from for all networks and applications in the world of communication 2

Secure voice communication in the age of convergence is a core competence which applies to the everincreasing number of new technologies. Network topologies are changing more rapidly than ever before, and classic telephone networks are converging with modern IP-based ICT structures that offer operational and structural benefits. We have the in-depth knowledge and experience to ensure the seamless integration of security technology into the widest variety of communication networks. As a full-service provider with expertise in practically all common communication technologies, we can implement your individual security solution for combined use with fixed-network telephones, secure telephones and portable satellite telephony terminals. For IP-based telephony you may use our proven IP VPN security solutions as either a stationary or a portable system. Our IP encryption is multi-media capable and can therefore be used for further applications (e.g. data, video) in your ICT infrastructure. Thanks to our service portfolio you will receive a customised solution to help you benefit from all the technological advantages and to provide optimum support for your security policy. Our future-proof solutions will support upgrades and further technological developments, thus ensuring that your investment is protected in the long term. Encrypted voice communications in modern IP networks 1 1 2 2 IP PBX PBX Headquarters Traveller Crypto Mobile Client Sat Terminal IP VPN IP VPN SAT IP/Internet Branch Office IP VPN Traveller 3

Voice communication in military C2 applications The duties of a defence organisation are manifold as are their requirements for voice communication: here too, the migration of technologies impacts the universally secure communication. Incorporation into existing and new C2 (Command & Control) structures is a challenge for the future. Solutions from for military use in strategic networks can fulfil all the requirements of this environment and are interoperable. The systems have been designed with a pre-planned improvement capability to grow with new applications and technologies, thus offering optimum protection of your investment and ensuring that your organisation is wellprepared for future developments. Secure communication solutions from can be smoothly integrated into your existing networks and offer end-to-end voice encryption for maximum security requirements. Connections via leased lines/dedicated lines are just as feasible as connections via, satellite or microwave. Security philosophy and architecture The main elements of the comprehensive security architecture from Crypto AG for all voice encryption solutions are encryption in a tamper-proof hardware encryption module based on secret, user-specific algorithms, and safe security and key management in offline or central online mode. The flexible and secure management functions allow you to form and manage individual cryptographic groups in any way you want hierarchical, horizontal or overlapping. In case of equipment loss, protection is ensured as individual units can be excluded from the network at any time. 4

... but there is also a high-security encryption solution for each telephone technology Security solutions from offer comprehensive protection from interception for classic networks by means of end-to-end encryption. Flexibility for use in your existing telephone infrastructure is ensured, without the need for any change to your working practices. The technical integration does not require any adjustments to existing systems or equipment. units can be placed on your desktop, in the secretarial department where they are operated, or can be implemented to be shared by several users. Interconnectivity between the fixed network and the network is ensured by the compatibility of the products with encryption and the secure telephone. Theses systems can also be used for applications via satellite connection. Convenient handling is provided by the KHC-2000 Key Handling Centre, for the central or decentralised management of security data in the encryption units and for key changes. By forming cryptographically protected groups you can reproduce your organisation s structure in the communication structure and make changes at any time. When working in online mode you can establish secure connections to any single unit in the network without risk. Secure voice end-to-end communications in and networks and via satellite links 1 3 Border Guard 2 PBX VIP Laptop Headquarters Key Handling Centre Branch Office Secretary PBX SAT Traveller VIP Sat Terminal Branch Office Sat Terminal 5

To Remain Sovereign is your ideal partner for the efficient and secure handling of information. As a legally and economically independent Swiss company, we are not subject to any export restrictions. We have developed, manufactured and implemented custom security solutions for over 55 years. The package we offer features the latest technology solutions and comprehensive services. Throughout the entire lifetime of your system, we provide you with support services to guarantee autonomous operation and high availability whatever the user environment. You too can rely on the expertise and capabilities of just like our customers in over 130 countries., Headquarters P.O. Box 460 CH-6301 Zug Switzerland Tel. +41 41 749 77 22 Fax +41 41 741 22 72 crypto@crypto.ch www.crypto.ch, Regional Offices Abidjan 01 B.P. 5852 Abidjan 01 Ivory Coast Tel. +225 22 41 17 71 Fax +225 22 41 17 73 Abu Dhabi Abu Dhabi P.O. Box 41076 Abu Dhabi United Arab Emirates Tel. +971 2 64 22 228 Fax +971 2 64 22 118 Buenos Aires Maipu 1256 PB A 1006 Buenos Aires Argentina Tel. +54 11 4312 1812 Fax +54 11 4312 1812 www.crypto.ch Kuala Lumpur Regional Office Pacific Asia Level 9B Wisma E&C 2, Lorong Dungun Kiri Damansara Heights 50490 Kuala Lumpur Malaysia Tel. +60 3 2080 2150 Fax +60 3 2080 2140 Muscat Regional Office P.O. Box 2911 Seeb PC 111 Sultanate of Oman Tel. +968 2449 4966 Fax +968 2449 8929 A member of The Crypto Group 2008 CP Voice HC-2203 EN/0830