Zybersafe Solutions

A revolution in hardware encryption

Our solution has been designed to make the implementation of encryption, a simpler task for organizations of any size. We set out to build the markets most simple and fastest, yet secure hardware encryption devices. This has resulted in the Zybersafe Trafficcloak network encryptors.

The portfolio of network encryption devices is designed around the three pillars - Security, Simplicity and Performance.

Read below to get more information on the Zybersafe Trafficcloak portfolio and download additional information.



The Trafficcloak

The Zybersafe hardware network encryption appliance offers a transparent network data encryption service at wire-speed, using the internationally recognised Advanced Encryption Standards (AES 256 bit) algorithm for securing private information. The AES 256 bit algorithm is implemented in its most secure version (AES 256-GCM), and, in combination with our patent-pending unique failsafe network security and cryptography key management, we ensure carrier-class authentication, data integrity and protection against replay attacks.

The TrafficCloak is a powerful and efficient 1RU AES 256 bit hardware encryption appliance that is ideal for securing WAN traffic between enterprise facilities. All Zybersafe network data encryption appliances are factory-paired and pre-configured with encryption keys that are completely randomly generated from the built-in true hardware random number generator.

There is no need for annoying, cumbersome encryption key management and the associated security risk. Our purpose-built AES 256 bit hardware encryption appliance provides tunnel-less data protection for any Layer 2 network and integrates easily into any existing network. The TrafficCloak operates transparently to the network infrastructure, which ensures all traffic is encrypted without affecting network performance.

Zybersafe Trafficloak Network Encryption hardware portfolio

Key Features of the ZYBERSAFE TRAFFICCLOAK 1Gb Encryptor

  • Strongest commercial cryptographic technology available - AES256-GCM

  • 1Gbit Full-Duplex real-time encryption

  • Keys are not user manageable/accessible

  • Key generation from HW Random Number Generator

  • Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured

  • Supports 1 G, 10 G or 100 G ethernet point-to-point links

  • Encryption of unicast, multicast and broadcast traffic

  • Network integration without any change of infrastructure (virtual wire)

  • No impact on existing redundancy mechanisms

  • Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant

  • Zybersafe-DSC_6802-venstre-WEBres-800px

    Zybersafe Trafficcloak

    1Gbit

    Network Encryptor

    • ZS TrafficCloak L2 1G P2P KIT w. Dual PSU AC - (2 x ZS21526-1G) excl. SFP
    Key Features of the ZYBERSAFE TRAFFICCLOAK 10Gb Encryptor

  • Strongest commercial cryptographic technology available - AES256-GCM

  • 10Gbit Full-Duplex real-time encryption

  • Keys are not user manageable/accessible

  • Key generation from HW Random Number Generator

  • Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured

  • Encryption of unicast, multicast and broadcast traffic

  • Network integration without any change of infrastructure (virtual wire)

  • No impact on existing redundancy mechanisms

  • Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant

  • Zybersafe-DSC_6802-venstre-WEBres-800px

    Zybersafe Trafficcloak

    10Gbit

    network encryptor

    • ZS TrafficCloak L2 10G P2P KIT w. Dual PSU AC - (2 x ZS21526-10G) excl. SFP+
    Key Features of the ZYBERSAFE TRAFFICCLOAK 100Gb Encryptor

  • Strongest commercial cryptographic technology available - AES256-GCM

  • 100Gbit Full-Duplex real-time encryption

  • Keys are not user manageable/accessible

  • Key generation from HW Random Number Generator

  • Man-in-the-middle and replay protection of transmitted data • Authentication and data integrity secured

  • Encryption of unicast, multicast and broadcast traffic

  • Network integration without any change of infrastructure (virtual wire)

  • No impact on existing redundancy mechanisms

  • Designed to comply to FIPS 140-2 L3 and Common Criteria EAL4 • CE compliant

  • Zybersafe-DSC_6787-venstre-Highres

    Zybersafe Trafficcloak

    100Gbit

    Network Encryptor

    • ZS TrafficCloak L2 100G P2P KIT w. Dual PSU AC - (2 x ZS21526-100G) excl. QSFP28

    Stay in touch with us