TACLANE Adaptable Security Platform (ASP)
IT FRIENDLY, MODULAR, HIGH ASSURANCE SECURITY FOR THE ENTERPRISE – COMING SOON!
The new TACLANE E-Series product portfolio is designed to bring high assurance security into the enterprise with a focus on adaptability, availability, and maintainability. Through a modular foundation, the TACLANE Adaptable Security Platform (ASP) enables organizations to right size their security solution for today, while offering scalability to meet evolving needs.
Designed to align and scale with IT ecosystems and requirements for next generation multi-domain battlespace, the TACLANE-ASP supports user replaceable cryptographic line card modules that support rapid expansion for future capabilities like increased bandwidth, security features, and/or data personalities. The TACLANE-ES100 Crypto Module is Ethernet Data Encryption Cryptographic Interoperability Specification (EDE-CIS) compliant and provides up to 200 Gb/s throughput. With two modules inserted, the TACLANE ASP provides up to 400 Gb/s aggregate throughput in various configurations (1x10G, 2x10G, 4x10G, 100G).
TACLANE-ES100 (KGV-185B) TO SUPPORT PRE-PLACED KEYS (PPK) IN ADDITION TO KEY MANAGEMENT INFRASTRUCTURE (KMI)
Adding support for PPK allows for interoperable communications in disconnected networks.
Learn More About Layer 2 and Layer 3 Network Security
Explore the differences between Layer 2 Ethernet and Layer 3 IP encryption, when and why you would choose one over the other, and how they can be employed together to achieve data protection with optimal network efficiencies.
WEBINAR: CHOOSE THE RIGHT ENCRYPTION SOLUTION
Check out our webinar with Cyber Systems' Chief Technical Officer, David King, and Enterprise Solutions Architect, Chris Hubbard, to learn about the importance of security with performance. In this on-demand webinar, they discuss the differences between Layer 3 IP and Layer 2 Ethernet encryption solutions, when and why you would choose one encryption approach over the other, and how both solutions can be employed together to achieve data protection with optimal network efficiencies.