X-Kryptor Secures all Networks

Similar documents
VIRTUAL PRIVATE NETWORKS (VPN)

Barron McCann Technology X-Kryptor

HP V110 Wireless-N Router Series

QuickSpecs. Models HP V110 Cable/DSL Wireless-N Router HP V110 ADSL-B Wireless-N Router

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

QuickSpecs. Models HP 110 ADSL-B Wireless-N Router

It is the process of sharing data, programs, and information between two or more computers.

EN-4000 Hardware Description and Specifications

L2F Case Study Overview

OSBRiDGE 3GN Outdoor MIMO 2.4GHz Access Point with integrated UMTS/GSM for Cellular Backhaul

Six Questions to Answer When Buying a Phone System

HG658d Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

Network+ Guide to Networks 6 th Edition

HG658 Home Gateway. User Guide HUAWEI TECHNOLOGIES CO., LTD.

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Universal Communicator

Intranets and Virtual Private Networks (VPNs)

Using Essential Viewing over BGAN. Version

4G/LTE VoIP Wireless Router Z-LTE9322

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Virtual private networks

3050 Integrated Communications Platform

Gigabit SSL VPN Security Router SG-4800

VPN Cloud. Mako s SD-WAN Technology

WIRELESS ENVIRONMENTAL MONITORS

Seamless Cloud Connectivity. for your business

Choose an internet connection to suit your business

Alcatel OmniAccess 200 Series

Gigabit SSL VPN Security Router

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Product Model 1058 Standalone and Rack Card Product Name VDSL Modem Product Manager John Grant Contact

The SonicWALL SSL-VPN Series

Unified Office Gateway UMG Quick Installation Guide. Version: 1.0

Chapter 10. Glossary

Network Services. Mobile Xpress

INTRODUCTION TO ICT.

BlackBerry Mobile Voice System

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

NSG100 Nebula Cloud Managed Security Gateway

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Tony Coles, President & Chief Executive Officer Ground Control Systems

WHG711 V3.20. Secure WLAN Controller

Chapter 9 Introduction to Networks

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V2 Page 1 of 16

The Aruba Mobile Virtual Enterprise for Government. The Next Generation Network Access Architecture for Mobile Technology

Reaping the Full Benefits of a Hybrid Network

AC2600 Home Roaming Wi-Fi Router

ExtremeWireless WiNG NX 9500

DEFINITY ProLogix Server

TEW-211BRP. Wireless AP Router. User s Manual

Check Point 1100 Appliances Frequently Asked Questions

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Special Provision No. 683S27 June 2017

Technical Product Specifications

20 to 1000 MHz rack mount, 1kW family of products

NetPro. from Wireless Logic. Available on a per SIM license basis. No CAPEX. Retain your Airtime Contracts with your existing providers

UTM Content Security Gateway CS-2001

Get the most from your Broadband

Network Service Appliances

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Datasheet. Hybrid Cloud Key Technology with Integrated Application Server. Model: UCK-G2. Fully Integrated, Stand-Alone UniFi Controller

Wireless Field Data Backhaul

Datacryptor AP Layer 3 IP Encryptor

Billion SG6200NXL Series

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Cisco SR 520-T1 Secure Router

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

WHG713. Secure WLAN Controller

HP ProCurve MultiService Controller Series

Chancen und Risiken im Bereich von WLAN's. FGSec - Vorabendveranstaltung 20. Juni 2002 Uwe B. Kissmann

Cisco Edge 300 Series

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

How to Choose the Right Bus for Your Measurement System

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Who are the customers for the Model 2172?

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

Texas Health Resources

NX 9500 INTEGRATED SERVICES PLATFORM SERIES FOR THE PRIVATE CLOUD

enetworks TM C2C Hardware Description and Specifications A.1 C2C Chassis Hardware Description

Ruckus ZoneDirector 1106 WLAN Controller (up to 6 ZoneFlex Access Points)

Wireless Access Points & Controllers

Wireless (Select Models Only) User Guide

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

SBX-AC1200P/SBX-1000P

Description. SmartControl with PoE: SSC-P008. Feature Summary. Rear View of SSC-P008

Cisco MCS 7815-I1 Unified CallManager Appliance

Broadband for a mobile planet

Wireless Networking by Ron Fugazzi

Our Virtual Intelligent Network Overlay (VINO) solutions bring next-generation performance and efficiency to business networks throughout North

Environmental Conditions

A Guide to Routers. Connectivity Type. ADSL (Telephone Type)

Ethernet to Digital In ED-516. Connect, Configure, Control. ED-516 ETHERNET TO Digital IO 16 Inputs. Digital Inputs 1-8. NuDAM/ADAM Module connection

Why Use Cisco Network Storage Systems for Your Business

Children s Health System. Remote User Policy

Transcription:

Features Secure wired and wireless networks Protects data in transit Supports home and mobile working Compatible with xdsl, Wi-Fi and 3G Prevents unauthorised access to your network Scalable for small and large organisations Certified to CAPS Baseline Grade X-Kryptor Secures all Networks Why choose X-Kryptor In today s flexible working environment, many organisations find that allowing their employees to work part or full-time from home offers tremendous productivity benefits. Keeping your remote users connected to your network is critical, but for those users working with protectively marked or commercially sensitive documents, the security risks of using public networks, such as the Internet or mobile telephone networks, are often too great to justify. The Ultra Electronics X-Kryptor family of network security appliances allows secure connection between your organisation s sites and allows secure access for your remote users, protecting your data against external attack and disclosure of sensitive information. comfidencial

Why choose X-Kryptor X-Kryptor enables you to build a cost effective network and communications infrastructure without compromising the high levels of security you demand. Whether you are a small organisation with 25 or fewer users, a large government enterprise or a department supporting thousands of users, the X-Kryptor family has a solution to fit your network. Add strong encryption across all IP networks, including Broadband, X DSL, Wi-Fi, Bluetooth, GPRS/3G, satellite and microwave networks. Extend your LAN by building secure site-to-site links using existing public network infrastructures such as the Internet. Provide secure remote access for your home-based and mobile users with X-Kryptor VPN Clients. X-Kryptor scales as your network grows. Manage security across your entire network from a single point. Approved by CESG under CAPS for UK Government and MOD use. Secure Mobile Computing Secure Networks Fixed line ISDN Fixed line xdsl IP Network 3G xdsl Broadband GPRS Secure Wireless Secure Remote Access comfidencial

How does X-Kryptor work? The Advanced Encryption Standard (AES) algorithm with a 128 bit key is at the core of the X-Kryptor s encryption engine. It encrypts all traffic being sent or received across any WAN or LAN. Further cryptographic protection is provided via a signed Diffie-Hellman key exchange mechanism. Keys can be configured to renegotiate automatically based on set time periods or data throughput volumes, according to the exact security policy of your organisation. X-Kryptor is approved by CESG under the CAPS security evaluation scheme and provides Baseline approval for RESTRICTED data over an unclassified network. It has been chosen to secure the most sensitive environments, including areas within the MoD, Central Government, law enforcement, the health sector and commercial organisations. X-Kryptor is totally flexible, fitting in with the way you want your network to operate. It is designed to work alongside other security products such as firewalls and intrusion detection systems. When choosing network security products you need a solution that will grow with your network. The extensible design of X-Kryptor means that as the number of users on your network increases, you can add and configure extra X-Kryptors simply and quickly. The management of your network security and VPN access is a key concern. X-Kryptor includes simple-to-use management software that is browser-enabled, allowing you to manage security across your organisation from a central point anywhere on the network. Secure Networks X-Kryptor site-to-site VPN solutions enable organisations to securely connect head offices with branch and remote offices using public networks such as the Internet. Inexpensive and readily available third party network infrastructure products can be used to seamlessly extend secure LAN s across cities, countries or even continents. Smaller organisations that have previously found connecting offices expensive and time consuming can now use inexpensive and readily available Broadband access products such as ADSL. Security concerns associated with using the Internet to connect your sites are addressed by X-Kryptor s built-in encryption engine. X-Kryptor creates secure tunnels between your sites, protecting your data from disclosure. In addition to strong encryption, X-Kryptor Stealth mode further increases your site-to-site network security by preventing gateway X-Kryptors from acknowledging unsolicited traffic. This feature allows the device to remain hidden from all unauthorised users or attackers. Remote Access Clients International Office Partner IP Network Headquarters Regional Office

Secure Remote Access X-Kryptor VPN Client technology enables you to build secure remote access solutions using common, easily available and inexpensive ISP services. X-Kryptor VPN Clients add a layer of strong encryption to common mobile communications devices and is compatible with most Microsoft desktop operating systems. X-Kryptor VPN Clients include Lockdown mode to further increase security. In Lockdown mode, remote access clients will not communicate with ANY other IP service in the unclassified network. Similar to a personal firewall, this feature allows the client to remain hidden from attackers and prevents the user from communicating with anything other than the X-Kryptor protecting your central site. No two organisations have exactly the same remote access requirements and to address this X-Kryptor Home-based Workers Allows your home users to use inexpensive and flexible Broadband technologies such as ADSL, cable based Internet or PSTN to connect to your network from home. Mobile Workers Users away from the office can stay connected to your network by using their portable computers, PDA s and mobile phones, or by using Internet connections offered by many hotels and airports. Mobile Workers GSM/GPRS 3G Service Hotel Internet Service Hotspot Satelite Phone IP Network ADSL, ISDN, Cable Modem etc Home Workers offers two different remote access VPN solutions. Both solutions can be operated simultaneously on the same remote access network giving you enormous flexibility when designing your remote access infrastructure. Headquarters Regional Office Secure Wi-Fi Wireless LAN (Wi-Fi) based networks are fast becoming a standard feature of modern networks. The rapid increase in wireless hotspots and technology adoption from major laptop vendors mean the popularity of Wi-Fi will increase further. The security risks of using wireless Clients X-Kryptor Access Point Clients LAN s are well documented, and although security is improved in the more recent wireless standards, there is still a large gap between the levels of security found in conventional wired networks. By using X-Kryptor VPN Clients, your organisation can implement an office-based wireless LAN with the same high levels of security as a traditional network. The solution consists of X-Kryptor VPN Client software placed on your users PC s and an X-Kryptor network security appliance connected directly behind your wireless access point. All data transmitted over the wireless LAN is encrypted using strong encryption, meaning that commonly used Wi-Fi hacking tools cannot be used to gain access to your LAN.

X-Kryptor Technical Services Our in-house X-Kryptor Technical Services Team is familiar with carrying out implementations in highly secure, sensitive environments; including the MoD, Central Government, law enforcement, the health sector and commercial organisations. Specification (XK 25 and XK 100) Model X-Kryptor Lite X-Kryptor 25 X-Kryptor 100 Network Throughput 11Mb/s 25Mb/s 100Mb/s Processor DRAM Flash Non Volatile Ethernet ports Manager Port Display Manual control Operating System Software XK 100 Environmental data Approvals Safety Input Voltage Current 600 MHz BCM 1125 MIPS64 128 MBytes 8Mbytes 128K Auto Sensing 10/100/1000 Mb/s Asynchronous, 9600 bp/s, 8 data, No parity, 1 stop bit, Xon/Xoff) Backlit LCD Rotary Controller with push select Multi-tasking / Real-time operating kernel, no direct user access Bespoke encryption Gateway application Telnet and Web browser interfaces for system set-up and administration As above but with an additional Hardware Encryption Module EN55022 Class B EN60950 85-250V 50/60Hz 0.2A max Operating Temp -10 C to 55 C Thermal Output Operating Humidity Weight Dimensions 20Watts / 69 btu per hour running at maximum throughput (Non Condensing) 30% - 90% RH 5.3 kg 435mm W x 335mm D x 45mm H (1U) The X-Kryptor is designed for 19 rack or shelf installation. Rack mount brackets are optionally specified. For desk mounting four feet are provided on the bottom of the chassis. The X-Kryptor will install into a 1U rack space if the feet are removed. The sides of the enclosure provide the cooling for the product. The heat sinks may be hotter than the ambient temperature and care should be taken when handling a unit that is or has recently been powered. Whilst no forced cooling is necessary, care must be taken with the installation of the product to ensure that the heat sink fins do not become blocked with cables or other items. Air must be free to move through the fins at all times.

Ultra Electronics AEP NETWORKS Knaves Beech Business Centre Loudwater High Wycombe Buckinghamshire, HP10 9UT Main Switchboard: +44 (0)1628 642 600 Email: information@ultra-aep.com www.ultra-aep.com www.ultra-electronics.com Ultra Electronics reserves the right to vary these specifications without notice. Ultra Electronics Limited 2012. 120706 / ULT / 3261 / JS