Establish End-to-End Encrypted Connectivity

Robust security, low latency, and high performance in Layer 2 and IP networks.

image description

Robust, Scalable Encryption of Data in Motion

Thales e-Security delivers data-in-motion encryption hardware that enables businesses and government agencies to establish secure, affordable, and high-performance connectivity.

Gain Strong Safeguards

Utilizing high-assurance encryption methods and state-of-the-art key management techniques, these solutions deliver maximum protection of sensitive transmissions and assets.

Maximize Performance

These hardware encryption solutions offer high performance, and significantly lower latency than software encryption capabilities embedded in common network devices.

Ensure Compliance

Utilize the most cost-effective data transport medium available, while also meeting business and regulatory requirements for data privacy and confidentiality.

Deployment Flexibility

Choose from a range of Datacryptor models, so you get the solutions that match your network, speed, certification, and customization requirements.

Strong Network Defenses

The solution completely masks traffic patterns to prevent surreptitious traffic analysis.

Maximum Bandwidth Efficiency

Thales e-Security solutions deliver high-speed security at up to 95% bandwidth efficiency.

Data Sheet : Datacryptor 5000 Series

The Datacryptor 5000 Series is a family of high-speed data in motion security platforms that deliver high performance encryption at near zero latency. Using advanced connectivity features, the Datacryptor 5000 Series secures data through Ethernet and IPv4/IPv6 Wide Area Networks. Industry-unique throughput optimization techniques ensure up to 95% network efficiency over Metro Carrier Ethernet, IP, cellular, and SATCOM networks. While other solutions merely encrypt data, Datacryptors provide a complete security solution that scales from simple point-to-point to many hundreds of endpoints.

Download

White Paper : Understanding Value of MPLS Ethernet Encryption

Multi Protocol Label Switching (MPLS) has been around for over a decade, so calling it new technology would be inappropriate. But MPLS continues to evolve, offering new types of carrier services and becoming the predominant wide area network (WAN) service offered by telecommunication providers. This paper examines the concerns of CIOs, CISOs, and network architects over the secure use of MPLS; looks at Layer 3 and Layer 2 services, and more...

Download
Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us