Request Our Cyber Product Whitepapers

What Whitepaper Topic Are You Interested In?
Data at Rest Encryption Whitepapers

Select whitepapers for download.

Discover how high assurance encryption can meet your mission needs and reduce operational risk.

Multilevel Security Solutions Documents

Select documents for download.

Sectéra vIPer Voice Encryption Whitepapers

Select whitepapers for download.

Evaluate the differences in security, interoperability, flexibility and usability between Secure Voice over IP (SVoIP) and Voice over Secure IP (VoSIP) infrastructures as you choose the right secure voice solution for modern infrastructures.

TACLANE Network Encryption Whitepapers

Select whitepapers for download.

For more information on the differences between high assurance Type 1 and Commercial Solutions for Classified (CSfC), request our whitepaper and choose the security solution that’s right for your mission.

Explore the differences between IP Layer 3 and Ethernet Layer 2 encryption, when and why you would choose one over the other, and how they can be employed together to achieve data protection with optimal network efficiencies.

The new TACLANE RUZ feature is ideal for unattended operations and other high risk, hostile environments that are susceptible to overrun or unplanned leave behind. Request this whitepaper to learn how this feature reduces personnel risks, saves costs associated with equipment and logistics so Operators can focus on mission priorities.

The TACLANE Agile Performance Enhancing Proxy (PEP) function works by hosting a specialized version of TCP resulting in better performance than an end-to-end standard TCP. Request our whitepaper to learn more about how this software feature increases network availability and performance over disadvantaged networks.

As remote office and telework capabilities expand, organizations and users must consider key voice, data and network protection requirements. This guide explains key security considerations and recommended solutions to protect the most sensitive information in remote environments.

Whether it be an unmanned system providing close air support to troops on the ground or a ground vehicle mapping terrain, unmanned systems are finding more utility in the battlespace. This white paper describes key considerations and requirements needed in a cryptographic security plan to protect unmanned mission data.

Tactical Cross Domain Solution Whitepapers

Select whitepapers for download.

Discover how TACDS lets computers do what they’re good at: process data automatically, quickly, securely, and correctly. As a result, humans do what they’re good at: focusing on and executing the mission of the 21st century.

Learn how to decrease time to action, provide assured communications, and ensure that those operating maneuvers on Secure-But-Unclassified (SBU) networks can receive mission critical data from Fires operating on classified networks using TACDS.

Copyright 2024 General Dynamics Mission Systems, Inc.

A General Dynamics Business