ONS 27th - 30th August 2018
Stavanger, Norway

Meet us at the Danish Pavilion,
booth 5695

The next generation
in encrypted security

Cyber Security Products

Our specially designed series of unique, high-speed layer 2 network encryption boxes will protect your data integrity and confidentiality

AES256 GCM

Strongest crypto algorithm

Ensures authentication

High data integrity

Replay attack protection

Wire Speed

1G and 10G Ethernet models

Real-time Layer 2 encryption

Low latency

Keys

Keys are not user-accessible

Changes every five minutes

HW random number generator

Tamper Proof

Mechanical blockades

Electronic traps

Intelligent tamper architecture

Zybersafe TrafficCloak Ethernet encryption

 

Espionage, manipulation and theft

Companies are under increasing pressure to further protect intellectual property rights and privacy against espionage and criminal activities. Criminal organisations and states attempting to access private data are growing still more creative in surveying, manipulating, intercepting and stealing this data.

We know that securing data in motion is paramount. Data sent through fiber lines is not automatically protected and can be easily accessed with the right equipment.

Facts

0

percent of cyber attacks have espionage as its motivation

0

percent of large companies have reported cyber security breaches within the last 12 months

0

percent of incidents can be attributed to errors in configuration or setup by system administrators

To receive specific information on our products, please fill in your details

frontpage
Carina JørgensenWelcome