Encryption
Secure Communication
Then there is the false sense of the security of Private Networks. Private Network Service provider networks, such as Metro Ethernet and Telco WANs, have unmanned facilities or minimal security at manned locations. Access to interconnecting circuits can be obtained at Telco Switching locations or at a multi-tenant building’s common phone closet. Network service providers utilize collocated common equipment that is maintained by unvetted technicians. Increasing innovative industrial espionage among highly competitive businesses requires that extensive security measures are employed. Enterprises are experiencing network attacks that seek to obtain the most important or profitable sources of information including: | |||||||||
| |||||||||
“With the threat of a data breach looming large over every corporation that handles sensitive information, encryption has become the No. 1 answer to the question, 'How do I protect myself?' Then there are the mandates -- the Health Insurance Portability and Accountability Act, Graham-Leach-Bliley, Sarbanes-Oxley, the Payment Card Industry data security standard, and other regulations -- that require data protection, for which encryption is again the obvious answer.” – Network World (10/2007) Encryption is the key to ensuring confidentiality, data integrity, and accountability. Advanced Encryption Standard is the government approved solution for protecting Data, Voice and Videotransmissions. AES, specifically using 256 bit keys, offers the enterprise network a secure method for transmission of confidential and secret corporate and government information. | |||||||||
| |||||||||
Encryption - Circuit and Ethernet The Engage Black•Bond and Black•Door products ensure the confidentiality and integrity of Intranet and Internet networks with the strongest commercially available cryptography that provides a secure and cost-effective solution for voice/video/data encryption that is compatible with VoIP, Video over IP, Multicast and its latency sensitive applications. Despite the importance of encrypting sensitive or confidential information over a network many business and governmental organizations send information in clear text. A company’s formal policy may demand encrypting sensitive or confidential information in transit but managers routinely fail to comply with this mandate. The most typical reasons are: | |||||||||
| |||||||||
Engage Communication’s packet and circuit Encryption solutions are purpose built encryption appliances that take the cryptic out of cryptography. Every aspect of public and private communications security needs to be under scrutiny. From private infrastructure to shared public networks, the considerations for security are essentially the same. | |||||||||
| |||||||||
Engage’s Black·Door transparently AES encrypts Ethernet Voice, Video or Data packets. The Black·Door operates intransparent bridge, VPN, tunnel or route modes. As a transparent bridge all but the MAC layer is encrypted. This mode of operation is well suited for shared wireless networks such as Wi-Fi, or in LAN environments where the layer three protocols may not be IP. Bridging mode also protects network segments within an organization such as separating accounting from marketing. In tunnel mode a LAN segment is “tunneled” through a public or private network allowing a transparent bridge through any IP cloud. In route mode, individual encrypted routes are built to allow traffic flows over public or private IP networks. The unencrypted LAN segments at each end point can have unique keys to other remote peer networks. This method of operation has many applications in private enterprise as well as the public sector. Ethernet Encryption Engage's Black•Door Ethernet Encryptors protects the confidentiality and integrity of Intranet and Internet Ethernet networks with the strongest commercially available cryptography. Black•Door Ethernet Encryptor, which supports Point to Point and Multipoint information assurance configurations with unique dynamic keys, is specifically designed for real time wireline backbones and the full spectrum of outdoor Wireless WAN technologies including: Free Space Optics, licensed and unlicensed Radios. The Engage Black•Door GIG Encryptor offers customers Gigabit speeds for securing existing packet based networks. The AES based encryption algorithms offer industry standard security levels at multiple layers of the network OSI while supporting up to Gigabit Ethernet transmission speeds. The Black•Door GIG Encryptor is installed at the edge of the existing network interfaces and means instant security upgrades for customer satisfaction and network invisibility. | |||||||||
Self Configuring
| |||||||||
| |||||||||
Circuit EncryptionEngage’s Black•Bond Link Encryptors support the full range of Telecommunication and Networking equipment: | |||||||||
| |||||||||
TDM Circuit EncryptorAES Circuit Encryption is employed to prevent interception, tampering and disruption of public or private communication channels. Engage’s Black•Bond T1/E1 Link Encryptor utilizes the AES to secure secret and sensitive information transmitted over point-to-point or dial-up T1/E1 communication links.
Voice Encryption Encryption of interoffice voice calls eliminates wiretapping at unsecured phone closets and telecom service provider monitor jacks. AES Circuit Encryption is employed to prevent interception, tampering and disruption of public or private communication channels. The need to employ end to end circuit encryption is a top priority for organizations that are aware of their vulnerability. Circuits from the Phone Company are commonly thought of as private and not accessible or requiring sophisticated equipment to tap. Ready Access to Communication Channels | |||||||||
Encryption Method The Advanced Encryption Standard (AES) with 256 bit keys is utilized by the Black•Bond to protect electronic data. The AES algorithm is a symmetric block cipher that encrypts and decrypts information. AES is a FIPS approved symmetric encryption algorithm that may be used by U.S. Government organizations (and others) to protect sensitive information.
| |||||||||
Click here to learn more about our Circuit Encryption Solutions |