30.11.2012 Views

Layer 2 Network encryption Verifiably secure, simple, fast. - Secunet

Layer 2 Network encryption Verifiably secure, simple, fast. - Secunet

Layer 2 Network encryption Verifiably secure, simple, fast. - Secunet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Simple and effective - from integration<br />

to commissioning right through to live operation.<br />

SINA L2 Boxes can be integrated into your network conveniently and<br />

quickly and no change to your network infrastructure is required! Encryption<br />

is performed between boxes that are “invisible” to the network – the<br />

components can be deployed immediately and are easily integrated into<br />

the line between provider and company network. The <strong>simple</strong>st installation<br />

for a medium-sized company or public authority network, for example,<br />

can be completed within one day and without affecting live operation.<br />

SINA L2 Box<br />

From the point of integration onwards, your data and classified matters<br />

are transferred <strong>secure</strong>ly. Attackers are no longer able to identify the network<br />

infrastructure behind the SINA L2 Boxes. Once in use, the SINA L2<br />

Boxes operate with practically no administration and maintenance, thus<br />

reducing your operating costs to a minimum.<br />

Installation, maintenance, analysis by<br />

qualified personnel – professional and high performance.<br />

Professional set-up by secunet in combination with tailored, maintenancefree<br />

operation of the <strong>encryption</strong> solution guarantee the highest possible<br />

protection and continuous availability of your SINA L2 Boxes.<br />

The quality of the network connections between SINA layer-2 encryptors<br />

can be demonstrated via a wide range of analysis and measuring services.<br />

The deployment of state-of-the-art measuring devices enables the data<br />

throughput of your connection to be determined, error and protocol analyses<br />

to be run and, for example, real-life comparison data with and without<br />

<strong>encryption</strong> to be provided. This allows you to keep the performance and<br />

the security of your data in view at all times.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!