Secure Connectivity for Multi-Site Organisations Solution for Critical Connections Flexible Solution for Diverse Environments Insta is a (Virtual Private Networking) solution enabling secure connectivity for multi-site organisations. Insta is suitable for several types of environments, ranging from interconnecting a few sites to the global networking of an organisation with hundreds of sites. The solution is targeted at environments with strict information security requirements. Typical users include governmental organisations and other authorities as well as companies with security critical network connections. The Finnish National Communications Security Authority (NCSA-FI) has granted Insta national approval for CONFIDENTIAL (III) and RESTRICTED (IV) levels. Insta is an all-in-one solution for high security. Besides an encryptor appliance, the system also includes integrated key, configuration and user management as well as full remote management for the encryptor network. A typical scenario is interconnecting sites of a geographically distributed organisation, providing secure communications among the sites. Another common application is an environment where sites access an organisation s centralised services containing classified information. An encryption system implemented with Insta can be extended and upgraded as needed, making it a cost effective solution with a long life cycle. The encryptor is available in 100Mbit/s and 1Gbit/s versions and 100Mbit/s appliances can be easily upgraded to 1Gbit/s speed as needed.
A Forerunner in Safe Networking Finnish Security Approved Product Insta has a long track record of developing encryption solutions for security-critical environments. As proof of our role as a forerunner, Insta is the first Finnish product to gain national approval up to level CONFIDENTIAL (III). System-Wide Security Concept Flexible and Cost-Effective Comprehensive routing protocol support enables connectivity without separate routers in most network environments. Additionally, a single appliance can be used for handling information with different security classifications, providing cost savings by reducing the number of appliances. Insta s unique security concept covers all aspects required by mission-critical systems. These include state-of-the-art encryption algorithms, secure key generation and transfer, strong user authentication and physical security of the Gateway appliance. Extensive Support Services High Performance and Reliable Long Life Cycle Guaranteed Insta s performance guarantees that encryption will not become a bottleneck, even in heavily loaded environments. Support for device redundancy and distributed management guarantee high availability, even in the most critical applications. Due to governmental customer needs, maintenance and support for the solution is guaranteed to last long into the future. Continuous product development ensures that the solution adapts to ever-changing security and networking requirements. Insta offers extensive life cycle support, including deployment and training services, technical support and maintenance. We also provide repair and maintenance services for the encryptor appliances.
Customer sites Customer Site 1 Service management Internet Insta Service Center service environment management and monitoring CA service (certificates and CRL) Log management service Other support services ISO 9001 ISO/IEC 27001 ITIL Also Available as a Service Implementing a high security encryption solution requires a lot more than a security-approved encryption product. Prerequisites for the electronic transfer of security-classified information include well implemented certificate and log management services as well as security-approved processes, premises and operating personnel. The Insta service provides all this effectively, being an easy and cost-effective way of achieving high security. The Insta service is based on the security-approved Insta solution. appliances are installed at customer sites, providing transparent protection for all customer payload, such as email, VoIP and documents. service management is provided from the security- and quality-certified Insta Service Center. Uncompromised confidentiality of customer data is guaranteed by fully separating service management traffic from the customer payload. Service deployment is implemented as a turnkey solution by Insta s experienced professionals, also covering the testing and documentation required for security approval. During the production phase, Insta is responsible for the monitoring, management and maintenance of the system. The Insta service includes all that is required: Security approved encryption system, Insta CA service for certificate management Log management service Monitoring, maintenance and reporting Documentation and service processes Security-approved premises and operating personnel Service pricing is based on a monthly fee, depending on the size of the network.
Technical Specifications IPsec Routing Firewall and QoS Stateful packet inspection (SPI) Differentiated Services with DSCP-based classification and shaping Guaranteed & maximum bandwidth per class Other protocols throughput (AES-256/SHA-256) Versions: 100 Mbps 1 Gbps LAN-to-LAN Multicast over IPsec 256-bit AES/Serpent encryption and SHA2 integrity protection authentication: X.509v3 RSA or ECC (Elliptic Curve Cryptography) certificate, IKE PSK (Pre Shared Keys) Automatic Tunnel Establishment Static OSPF, BGP PIM-SM, PIM-SSM IGMPv2/v3 VLAN (802.1Q) SNMPv2c Syslog DHCP server NTP
For futher information on Insta and our other information security solutions, please visit: Contact us: security@insta.fi Insta DefSec Oy Sarankulmankatu 20 P.O. Box 80 FI-33901 Tampere, Finland +358 20 771 7111 www.insta.fi Insta DefSec Oy, part of the Finnish familyowned Insta Group, serves its customers with solid professional knowhow and genuine commitment. We enhance security in society by developing innovative solutions in Information Security, Public Safety & Security and Defence fields. We are an independent product, service and solution provider, specialized in high security applications. Our customer base includes authorities and governmental organizations as well as enterprises from financial, telecom and energy sectors.