Optional Features Enhance Security and Network Efficiency
In addition to providing proven, reliable and NSA certified HAIPE encryption, TACLANE® products are designed to accept optional software to extend the use and versatility of the encryptor. These optional software features gives customers greater flexibility and control of their network and devices based on their budget and mission requirements.
These features are available for new and deployed TACLANE encryptors via a simple license key activation process and can be configured and managed locally or remotely using the GEM™ X Encryptor Manager.
Optional software features available today include:
This feature adds Layer 2/Non-IP Ethernet capability to the TACLANE encryptor while preserving the benefits of HAIPE interoperability and security functions (like remote key transfers) as well as Layer 3/IP capability (like remote management). Per packet agility allows for simultaneous HAIPE and Layer 2 traffic to pass without any infrastructure changes. This feature provides equipment and cost savings associated with the reduced reliance on routing equipment and the elimination of cumbersome processes like GRE tunneling. The ability to pass multiple protocols (including VLAN tagged, IP, MPLS, etc.) eases network transitions as your infrastructure and networking requirements change. Other benefits include increased bandwidth efficiency and failover.
This feature addresses continuous monitoring and insider threat security by adding Cyber Sensing capability to the TACLANE-1G (KG-175G) encryptor. Using Deep Packet Inspection (DPI), this feature enables packet header and content filtering for malicious data and issues Type 1 encrypted alerts to further protect from attacks. Unlike any other IDS/IPS system, the TACLANE Trusted Sensor Software is able to support both open source, user unique or government classified rule sets. This in-depth inspection aids network administrators in understanding the overall health of the system and provides the ability to fine tune network filtering to reduce response time and increase defense in depth. This solution can be easily integrated into cybersecurity infrastructures in place today.