Using its long experience in the field of cryptography, the company NetSeT Global Solutions has created a set of products whose primary and sole purpose is secure transfer and storage of highly confidential data. These solutions are used in national security systems where the preservation of confidentiality and integrity of information is of vital importance, as well as in the corporate sector in the field of information and communication system protection.
Bearing in mind the degree of confidentiality of data these institutions have and the fact that commercial solutions and publicly available algorithms cannot meet the required level of protection, we have created a special set of cryptographic algorithms for these systems, but we also support the integration of dedicated algorithms and protocols designed by a third party.
Modular solution which, following the latest trends in the field of information security, provides full end-to-end protection during the exchange of critical data and their storage. In order to achieve a high level of protection, cryptographic keys are generated by using a hardware random number generator and are subject to rigorous statistical test check. Crypto Guard guarantees authenticity, privacy and integrity of sensitive information and performs detection of unauthorized and malicious attempts to change the data.
The key functionalities of the product called Crypto Guard are the following:
Crypto Proxy enables protection of access to your existing system regardless of its functionality and topology. Crypto Proxy is a proxy server which, due to the use of a specifically designed cryptographic algorithm and authentication protocol, allows client authorization and secure transfer of data to a server it protects.
To achieve this functionality, Crypto Proxy is architecturally designed as Reverse Proxy Server, that is, as a security component that is positioned between the client and the server, and which routes all requests sent to the server. In addition to managing messages sent to the server, this component specifies cryptographic standards that clients must comply with in order to get access to the server.
Crypto Proxy is an ideal solution if you want to raise the security of your existing system to a higher level, without changing the system itself.
The key functionalities of the product called Crypto Proxy are the following:
Specialized information system created in order to protect data that is exchanged between government institutions that manage the information of the highest level of secrecy. Examples of these institutions are the Ministry of Defense, Ministry of Foreign and Internal Affairs, security agencies and the like. Cryptis enables secure creation, exchange and archiving of files of all levels of secrecy. Designed with the aim of protecting the complex geographically distributed systems with the possibility of mobile access and branched network structure, Cryptis represents an ideal solution for all systems from G2G (within government institutions) segment.
The key functionalities of the product called Cryptis are the following:
Military device that enables the exchange of data in real time within tactical and strategic PDH communication networks. The device uses specialized, specifically designed cryptographic algorithms that can be customized upon user’s request. To strengthen the security of the system further, the keys used for the protection of information are renewed in every session. Each direction of communication and each channel is protected by special keys to achieve uncompromising preservation of confidentiality and data integrity. In the basic version, this device supports up to 4 independent full duplex channels, with the speed of up to 8 MB/s.
The key functionalities of the product called iCD0804: