High-speed Layer 2 encryption
UltraCrypt is an affordable high-speed Layer 2 encryption appliance that protects critical infrastructure from both internal and external cyber-attacks. Its versatile security platform delivers low-latency network monitoring and filtering performance while its optimized form and design makes it easy to use and deploy anywhere in a network to selectively and invisibly protect one or several network endpoints.
UltraCrypt is specifically designed to deploy with no change to the existing architecture and with no impact on network performance. Encryption keys are able to be securely distributed over-the-network via an easy to use device-interface or key-management platform, ensuring that the encryption key’s life can be kept short and thus security kept high.
This high-speed encyrptor is uniquely positioned to support operational performance by operating at ~450 Mbps of encrypted throughput. It maintains low latency and jitter while providing per-packet data integrity, for the ultimate in high speed, military-grade encryption.
UltraCrypt is very easy to configure and manage, and can be performed either in-band or out-of-band. UltraCrypt comes in an industry leading small form-factor. No other device can provide the same level of high-speed throughput in the same small profile. Making it ideal for use in space-constrained environments or as part of a portable/deployable solution.
Featured Security Controls
- Layer 2 VLAN Encryption – Recent cyber-attacks have shown that encryption is needed to defeat and frustrate attacks. UltraCrypt provides high-speed low-latency VLAN encryption using AES 128 to 256 bit keys. UltraCrypt can encrypt up to 32 separate VLANs each with a separate key ensuring cryptographic separation between different traffic streams on the same network.
- VLAN Translation – UltraCrypt can manipulate VLAN tags meaning that it can change 802.1Q tags so as to switch traffic between VLANs, or be configured to prevent certain VLANs from traversing the network. This way UltraCrypt can act as a trunk port for a network allowing multiple encrypted VLAN tags out its network facing port.
- DarkNode Technology – Using DarkNode’s proprietary technology it can cloak industrial endpoint data and communications using a “stealth mode”, which means that an attacker can’t detect its presence – they cannot hack what they cannot see. It also can be integrated directly into an existing system with no additional configuration required.
Federally Validated to Meet Security Mandates
As a trusted supplier to the DoD since 1995, 3eTI delivers highly secure network platforms that enable maximum operational productivity. 3eTI’s patented platforms are certified to meet military IA standards. DarkNode is validated to FIPS 140-2 by the National Institutes of Standards and Technologies (NIST) and Common Criteria certified by the NSA’s National Information Assurance Partnership (NIAP) program.