Defence and government organizations frequently make use of direct, microwave, fiber optic or satellite Layer-2 communication links. This is especially the case where an alternative communication infrastructure is either inadequate or non-existent. Typically, such links connect fixed land installations or remote offices to headquarters and headquarters to its backup site.
However, in today's world, it is not difficult to intercept such communication links unobtrusively with off-the-shelf equipment; even optic fiber cables can easily be tapped and the data they carry interpreted or manipulated.
Since data leaks may involve confidential strategic information, the confidentiality and integrity of such information is crucial for any organization. Interception or modification of data may have devastating impacts on national security.
The OmniCrypt™ Link Layer-2 solutions constitute a proven, highly secure approach for protecting an organization's classified data against eavesdroppers and other infiltrators up to the highest classification level. It is the most reliable method and the key to preventing malicious attacks on classified data and thus on an entire institution.
These high-end encryption solutions offer an uncompromised security for any Layer-2 data link, irrespective of whether it is point-to-point, point-to-multipoint or multipoint-to-multipoint. The solutions are scalable and support different speeds and standards like Ethernet, SDH and PDH in order to fit today's requirements.
OmniCrypt™ National Algorithm Design (NAD) allows customers to completely define their own specific algorithm. Omnisec provides the algorithm framework, ensures know-how transfer to customer's cryptologists and furnishes tools and processes to ensure that cryptographically strong algorithms result.
PDH (Plesiochronous Digital Hierarchy) communications links are widely used in military networks for microwave and leased satellite communication connections.
Evidence of interception and signals intelligence collection confirms that OmniCrypt™ solutions are safe.
After a simple configuration of all encryptors in a Layer-2 network, all functions are fully automated. State-of-the-art network management offers local and remote monitoring firmware that updates and secures encrypted key distribution.
High speed communication links based on fiber, dark fiber and submarine fiber cables form the backbone of a government, defence and intelligence and even a country's entire communications infrastructure.
The OmniCrypt™ Link encryption method supports these high-performance, low-latency and high volume data transmission capabilities of Layer-2 technology.
The high-end encryption solutions have a low latency and scaled-down, optimized overhead; this makes it highly attractive for encrypted high-speed data transmission between headquarters, branches and small offices.
Within a transport network, one can either use one's own fiber network or a public metropolitan ETH (Ethernet), MPLS (Multiprotocol Label Switching) or SDH (Synchronous Digital Hierarchy) network from a local telecom provider.
The OmniCrypt™ Link encryption method supports high-performance, low-latency and high volume data transmission capabilities of Layer-2 technology.
It provides highly secure, full line rate transparent encryption up to 10 Gbps for data within a fiber optic or wide area Ethernet network – at wire speed.
To increase the operational reliability, the superior design of the electronics is concentrated on a new single printed circuit board. It is based on a red/black architecture, a careful segregation of signals that contain classified plaintext data (red signals) from those with encrypted data (black signals) and it is equipped with certain security measures to guarantee flawless operation of the device.
The Encryptor 671 has a low latency and scaled-down, optimized overhead; this makes it highly attractive for encrypted high-speed data transmission between headquarters, branches and small offices.
It provides complete flexibility for point-to-point, multipoint and fully meshed high-speed networks protecting mission-critical real-time applications within governments, defence, and intelligence organizations.
This Security & Network Management SNMC 736 offers state-of-the art network monitoring, alarming, and logging. Access to the SNMC Server is authenticated, the management instructions and traffic to the Encryptors as well as to the SNMC Client are fully encrypted.