Secure Network & Voice Products

SNVP Taclane Sectera GEM One Banner

General Dynamics Mission Systems world class family of High Assurance Encryption products are widely deployed today to protect national security systems, information and networks against persistent threats and defend our assets throughout cyberspace in land, air, sea and space environments. From the tactical edge to the enterprise, these Type 1 NSA-certified products secure classified information at the highest level of security to defend against dynamic threats and protect the nation's most critical information.

Registration is now open for the 2022 Cyber Products Showcase

SIGN UP FOR SECURE NETWORK AND VOICE UPDATES

TACLANE Logo

TACLANE® Network Encryption

TACLANE - the most widely deployed family of High Assurance Type 1 certified encryptors in the world - has been protecting critical information and securing national security systems for over 20 years. Our proven and reliable TACLANE encryptors extend classified secure communications and information sharing from the tactical edge to the enterprise.

 

Learn More About TACLANE

Sectera Logo

Sectéra® Secure Voice Encryption

Deployed worldwide from the enterprise to the front lines, Sectéra secure communication devices provide Confidence in Your Digital World™. Type 1 certified with the latest in crypto modernization capability, Sectéra products ensure SCIP interoperable, end-to-end secure voice and data communication solutions for legacy and modern infrastructures (Analog/PSTN, VoIP, SATCOM).

 

Learn More About Sectéra

Cyber and Electronic Warfare Systems- GEM One Encryptor Manager Carousel 1 - Image

GEM® One Encryptor Manager

Networks are becoming larger, more diverse, and faster every day. As networks grow, so does the number of encryptors needed to secure these networks and information storage systems. Often times these devices are located in different physical locations making the need for remote management critical. The GEM One Enterprise Encryptor Management software enables users to centrally configure, manage and monitor their network of encryption devices remotely, from anywhere in the network.

 

Learn More About GEM One