A revolution in hardware encryption
Our solution has been designed to make the implementation of encryption, a simpler task for organizations of any size. We set out to build the markets most simple and fastest, yet secure hardware encryption devices. This has resulted in the Zybersafe Trafficcloak network encryptors.
The portfolio of network encryption devices is designed around the three pillars - Security, Simplicity and Performance. Read below to get more information on the Zybersafe Trafficcloak portfolio and download additional information.Security
- All hard- and software developed by Zybersafe
- Embedded key management
- Tamper-proof Layer 2 –encryption: complete data-in-motion encryption
- Strongest cryptographic algorithm + integrity check with replay protection
Simplicity
- 1 button press initial setup - "Z-and-forget"
- No configuration &no software updates
- Integrated key management
- Only one security level
Performance
- Transparent for the payload and network
- Consistent Wire-speed encryption and consistent low latency
- 1, 10, 100 Gbps encrypted throughout
- Low latency (< 3 microseconds)
The Trafficcloak
The Zybersafe hardware network encryption appliance offers a transparent network data encryption service at wire-speed, using the internationally recognised Advanced Encryption Standards (AES 256 bit) algorithm for securing private information. The AES 256 bit algorithm is implemented in its most secure version (AES 256-GCM), and, in combination with our patent-pending unique failsafe network security and cryptography key management, we ensure carrier-class authentication, data integrity and protection against replay attacks.
The TrafficCloak is a powerful and efficient 1RU AES 256 bit hardware encryption appliance that is ideal for securing WAN traffic between enterprise facilities. All Zybersafe network data encryption appliances are factory-paired and pre-configured with encryption keys that are completely randomly generated from the built-in true hardware random number generator.
There is no need for annoying, cumbersome encryption key management and the associated security risk. Our purpose-built AES 256 bit hardware encryption appliance provides tunnel-less data protection for any Layer 2 network and integrates easily into any existing network. The TrafficCloak operates transparently to the network infrastructure, which ensures all traffic is encrypted without affecting network performance.
The Zybersafe hardware network encryption appliance offers a transparent network data encryption service at wire-speed, using the internationally recognised Advanced Encryption Standards (AES 256 bit) algorithm for securing private information. The AES 256 bit algorithm is implemented in its most secure version (AES 256-GCM), and, in combination with our patent-pending unique failsafe network security and cryptography key management, we ensure carrier-class authentication, data integrity and protection against replay attacks.
The TrafficCloak is a powerful and efficient 1RU AES 256 bit hardware encryption appliance that is ideal for securing WAN traffic between enterprise facilities. All Zybersafe network data encryption appliances are factory-paired and pre-configured with encryption keys that are completely randomly generated from the built-in true hardware random number generator.
There is no need for annoying, cumbersome encryption key management and the associated security risk. Our purpose-built AES 256 bit hardware encryption appliance provides tunnel-less data protection for any Layer 2 network and integrates easily into any existing network. The TrafficCloak operates transparently to the network infrastructure, which ensures all traffic is encrypted without affecting network performance.
Zybersafe Trafficloak Network Encryption hardware portfolio
Key Features of the ZYBERSAFE TRAFFICCLOAK 1Gb Encryptor
Strongest commercial cryptographic technology available - AES256-GCM
1Gbit Full-Duplex real-time encryption
Keys are not user manageable/accessible
Key generation from HW Random Number Generator
Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured
Supports 1 G, 10 G or 100 G ethernet point-to-point links
Encryption of unicast, multicast and broadcast traffic
Network integration without any change of infrastructure (virtual wire) No impact on existing redundancy mechanisms
Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant
Zybersafe Trafficcloak
1Gbit
Network Encryptor
- ZS TrafficCloak L2 1G P2P KIT w. Dual PSU AC - (2 x ZS21526-1G) excl. SFP
Key Features of the ZYBERSAFE TRAFFICCLOAK 10Gb Encryptor
Strongest commercial cryptographic technology available - AES256-GCM
10Gbit Full-Duplex real-time encryption
Keys are not user manageable/accessible
Key generation from HW Random Number Generator
Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured
Encryption of unicast, multicast and broadcast traffic
Network integration without any change of infrastructure (virtual wire) No impact on existing redundancy mechanisms
Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant
Zybersafe Trafficcloak
10Gbit
network encryptor
- ZS TrafficCloak L2 10G P2P KIT w. Dual PSU AC - (2 x ZS21526-10G) excl. SFP+
Key Features of the ZYBERSAFE TRAFFICCLOAK 100Gb Encryptor
Strongest commercial cryptographic technology available - AES256-GCM
100Gbit Full-Duplex real-time encryption
Keys are not user manageable/accessible
Key generation from HW Random Number Generator
Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured
Encryption of unicast, multicast and broadcast traffic
Network integration without any change of infrastructure (virtual wire) No impact on existing redundancy mechanisms
Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant
Zybersafe Trafficcloak
100Gbit
Network Encryptor
- ZS TrafficCloak L2 100G P2P KIT w. Dual PSU AC - (2 x ZS21526-100G) excl. QSFP28