Layer 2 Encryption Solutions

Network encryption solutions from Thales enable the protection of sensitive, high-value data in motion

Layer 2 Encryption

Using Datacryptor Link and Datacryptor Layer 2 standalone network encryption platforms from Thales, you can deploy proven solutions to maximize confidence that your sensitive, high-value data will not be compromised during transport. Datacryptor network encryption platforms offer increased levels of protection over unencrypted data transport and basic encryption capabilities embedded in routers and switches.

  • Challenges
  • Solutions
  • Benefits

Eavesdropping on Unencrypted Network Data

Attackers can “eavesdrop” on unencrypted data traveling over a network, not only impacting privacy but potentially opening the potential to modify or substitute data as a way to stage more sophisticated attacks.

Compliance with Data Protection Mandates

Because industry mandates often require protection for data in motion, organizations that do not implement this protection risk fines, embarrassing data breach disclosure statements, and resulting damage to their reputation.

Insufficient Security in Routers and Switches

Depending on the application, encryption capabilities embedded in routers and switches may not offer the combination of security and performance you need.

Datacryptor 5000 Series

The Datacryptor 5000 Series devices bring all the benefits of Layer 2 encryption to mixed backbone network types. Able to traverse Layer 2, IPv4 and IPv6 networks, the versatile Datacryptor 5000 is loaded with new features designed to secure data in motion with little to no impact to network performance and expensive bandwidth.

Datacryptor Link Encryption and Layer 2 Encryption

Datacryptor Link and Datacryptor Layer 2 standalone network encryption platforms from Thales provide secure, efficient, and scalable data transport for a variety of point-to-point and multipoint applications. The tamper-resistant devices protect data confidentiality using the strongest commercially available encryption algorithms, as well as government ciphers. The encryption platforms use sophisticated key lifecycle management and storage techniques—at near-line-speed performance.

High Bandwidth Efficiency & Robust Scalability

  • Comprehensive data in motion security for Layer 2, IPv4 and IPv6 Networks.
  • 95% bandwidth efficiency, which optimizes encrypted throughput from 10Mbps to 10Gbps.
  • Integrated group key management system, which scales to support hundreds of encryptors with no-cost redundancy.
  • Physical and logical separation of network administration and security responsibilities enforces policy and reduces opportunity for insider attacks.

Leading Security Capabilities

  • Traffic flow security to prevent traffic analysis and side channel attacks.
  • Field-upgradeability to protect against new threats and to ensure long service life.
  • Capabilities not found natively in network switches and routers, such as tamper-resistant physical hardening, strong authentication for administators, hardware-based key generation, and embedded and remote key management.
  • Support for the strongest commercially-available algorithms, government ciphers or customized algorithms.

Flexilible Support for Your Encryption Requirements

For organizations wishing to deploy country-specific or sovereign encryption algorithms and key management standards it is possible to minimize costs through the use off-the-shelf encryption devices that can be customized and reprogrammed to meet specific requirements.