Request Our Cyber Product White Papers

What White Paper Topic Are You Interested In?
Data at Rest Encryption White Papers

Select white papers for download.

Discover how high assurance encryption can meet your mission needs and reduce operational risk.

Multilevel Security Solutions Documents

Select documents for download.

Sectéra vIPer Voice Encryption White Papers

Select white papers for download.

Evaluate the differences in security, interoperability, flexibility and usability between Secure Voice over IP (SVoIP) and Voice over Secure IP (VoSIP) infrastructures as you choose the right secure voice solution for modern infrastructures.

TACLANE Network Encryption White Papers

Select white papers for download.

For more information on the differences between high assurance Type 1 and Commercial Solutions for Classified (CSfC), request our white paper and choose the security solution that’s right for your mission.

Explore the differences between IP Layer 3 and Ethernet Layer 2 encryption, when and why you would choose one over the other, and how they can be employed together to achieve data protection with optimal network efficiencies.

The new TACLANE RUZ feature is ideal for unattended operations and other high risk, hostile environments that are susceptible to overrun or unplanned leave behind. Request this white paper to learn how this feature reduces personnel risks, saves costs associated with equipment and logistics so Operators can focus on mission priorities.

The TACLANE Agile Performance Enhancing Proxy (PEP) function works by hosting a specialized version of TCP resulting in better performance than an end-to-end standard TCP. Request our white paper to learn more about how this software feature increases network availability and performance over disadvantaged networks.

As remote office and telework capabilities expand, organizations and users must consider key voice, data and network protection requirements. This guide explains key security considerations and recommended solutions to protect the most sensitive information in remote environments.

Whether it be an unmanned system providing close air support to troops on the ground or a ground vehicle mapping terrain, unmanned systems are finding more utility in the battlespace. This white paper describes key considerations and requirements needed in a cryptographic security plan to protect unmanned mission data.

Tactical Cross Domain Solution White Papers

Select white papers for download.

Discover how TACDS lets computers do what they’re good at: process data automatically, quickly, securely, and correctly. As a result, humans do what they’re good at: focusing on and executing the mission of the 21st century.

Learn how to decrease time to action, provide assured communications, and ensure that those operating maneuvers on Secure-But-Unclassified (SBU) networks can receive mission critical data from Fires operating on classified networks using TACDS.

Copyright 2024 General Dynamics Mission Systems, Inc.

A General Dynamics Business