Your IP network is not entirely yours; it encompasses links and devices controlled by carriers, by your provider and by your employees – if you have a BYOD (Bring Your Own Device) policy. It opens its doors to the visitors of your websites, to the partners that cooperate with you and to their personnel. It has many access points to connect with other technologies – PSTN, cellular, legacy mainframes… – that sometimes have their own views on what confidentiality and authentication actually are. You should expect, however, that the data that passes through these networks remains visible to your eyes only. A valid expecation, since that data represents the lifeline of your organization. It deserves to be encrypted with the best algorithms, secured even against the emerging threat of quantum computers, and carefully implemented in reliable devices, designed and crafted by world-class security experts trained to protect State and military secrets. In other words, your data deserve Telsy encryption.
The algorithms within the Sirio family are designed from the ground up to protect the confidentiality and integrity of data transmitted on IP networks. Sirio crypto devices:
- Are protocol encryption devices and thus operate at level three of the ISO/OSI stack. When the Sirio crypto devices are present, an internetworking infrastructure can be shared without risk. From the network architecture standpoint, they behave like routers.
- Are easy to install and reliable, based on hardware and software entirely developed by Telsy, thus ensuring their maintenance and evolution.
- Allow data packets originating from a device on a protected LAN (Local Area Network) to be completely encrypted, encapsulated within new data packets, unrelated to the original ones, and sent over static routes to the destination Sirio device that protects the target LAN, where the data packets are then extracted, decrypted and sent to their ultimate destination.
To satisfy every need and to accommodate every network architecture, Sirio devices come in different specifications, derived from the government-approved models that protect National secrets:
- Lan µ with copper interface and speed of 50 Mb/s;
- GW/2 with fiber interface and speed of 100 Mb/s;
- GW fully redundant, with fiber interface and speed of 100 Mb/s.
To define and distribute the keys and the security policies to the Sirio devices, using smartcards or crypto tokens, each network will have at its core a Key Distribution Center.
You will benefit from:
- Absolute confidentiality;
- Source network authentication;
- Protection against traffic analysis.