View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

Securosys Centurion

Using the Centurion Network Encryptors, (als called layer-2 encryptors and layer-2 over layer-3 encryptors) you can easily and cost-effectively secure broadband communications. It is the securest way to connect two or more sites. Through its native support of Ethernet and IP Centurion is ideal for all layer-2 encryption and layer-3 encryption over carrier Ethernet, MPLS and IP networks in any configuration: link, point-to-point, point-to-multipoint or mesh. No network reconfiguring nor sacrificing performance is required. Best key management and encryption Encryption, key exchange, and signature are using the strongest commercially available algorithms with key strength of 256 bits. The mature and proven key management supports both paired keys as well as bi-directional group keys and handles even the most complex network topologies with ease. The partial keys of the asymmetric Diffie-Hellman key exchange are signed and encrypted with a 256 bit AES key, resulting in a quantum computer safe key exchange. On top, the entire control plane is encrypted using authenticated symmetrical AES-GCM encryption at the native network layer. All processes, including key storage, take place in tamper-proof boxes, limiting any attack vectors. For highest security requirements The Centurion Network Encryptors (layer-2 encryptor and layer-2 over layer-3 encryptor) combine a secure device with a secure data plane, a secure control plane, and a secure management plane. They provide a protection level of "High Assurance" and are the best choice for the protection of government and enterprise multi-site networks with high security requirements. For the most stringent security requirements, the Centurion Network Encryptors also provide the option of traffic flow security, a mechanism that completely obfuscates network traffic. The Centurion Network Encryptors can secure your networks in a way that leaves any attacker frustrated. Uncompromising security. "Deploy and forget" instead of "patch and pray" also reduces operating costs and increases availability. Multi-tenancy built in The Centurion Network Encryptors include extensive multi-tenancy support and are also a perfect fit for managed security services. They integrate seamlessly with existing Network Operation Center (NOC), and Security Operation Center (SOC). Centurion is particularly suitable when high availability with low latency is required and where communications between servers, PBXs, terminal systems, databases and audio / video systems must be protected. Drop in Solution The Centurion Network Encryptors (layer-2 encryptor and layer-2 over layer-3 encryptor) provide secure encryption without the need to replace the whole network infrastructure. The Centurion appliance is autonomous and operates independently in point-to-point or large WAN networks. It is transparent to all higher layer network protocols. It is drop-in, that means it can be deployed without changing the network infrastructure or changing other network devices. It allows organizations to implement a security solution quickly with minimal network disruption while preserving current investments. Features:
  • Strongest encryption technology available (AES256-GCM, 512Bit ECC)
  • Perfect line protection – complete data flow via hardware crypto engine
  • Securosys hardware key generator (HW-TRNG)
  • Integrity and replay protection
  • Traffic Flow Security, Packet Aggregation
  • Tamperproof housing
  • Wirespeed performance with minimal latency (<5us@10G)
  • Carrier Ethernet (E-Line, E-Tree, E-Lan, VPLS, VPWS, MPLS-transparent)
  • Ethernet, MPLS or IP-tunnel over IPv4 and IPv6 network
  • Easy network integration, no network infrastructure changes
  • Autonomous, maintenance-free operation
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.