Encryption and Information security
has been the core area of Research for Shoghi Communications. Since Inception
Shoghi has been involved in Designing and Developing Mil-Grade and Crypto Validated
Communication Security Appliances for Government and Defense Information Protection.
Today Shoghi offers multiple Crypto solutions to its customers with total freedom
from Published algorithms and Key management schemes.
IP encryptor is a reliable and top-secure Virtual Private Network solution. It
enables businesses to build top-secure site-to-site communications over any IP-based
network (Intranet, Extranet, Internet). The high-quality products integrate easily
into existing networks and provide the appropriate scalability to ensure the desired
performance, and the user-friendly management tools make setting up a security
policy easy. VPN provides a platform to securely exchange e-mail, files and voice
over a corporate network or the Internet.
The combination of these products integrates easily into existing IP networks
based on third party products (firewall, virus checker, intrusion detector). This
provides our customers with the instruments required to tackle the networking
future.
Features
Ready for installation
into existing IP networks (including firewalls
and routers).
Designed
for use as a VPN system.
For
encryption networks with up to 5000 partners.
Unique modular standalone
platform (applies to IP Encryptor).
Fast Encryptor proprietary
block cipher hardware.
Secure Management: Configuration and monitoring of
IP encryptor office are possible
from anywhere in the secure network.
Installation
mode offering stepwise integration into the IP environment.
Two
separate 10/100 Base T Ethernet interfaces for private and public
traffic (trusted/untrusted area).
Additional interface for maintenance
and monitoring.
Supports
up to 500 simultaneous top-secure connections.
Security Architecture with
256-bit key length.
Proprietary
authentication, encryption and key management.
Bilateral session Key principle
(Once and only once).
Key changes according to amount of encrypted traffic
or elapsed time.