Crypto Management Suite CMS-1200
Comprehensive management is a very powerful element of Crypto encryption systems. The Crypto Management Suite CMS-1200 supports all necessary administration tasks and provides a useful collection of management tools geared to the needs of the administrator of an encryption system.
The core task in security management is to distribute and change the encryption keys. These keys are centrally defined, managed and distributed to all encryption units. First, a new key is generated in a payload domain and assigned an activation date. All encryption units using the corresponding payload domain now show a change in their status. This shows that an updated configuration is available. It is therefore evident immediately after a new key is defined, which units require an update by Crypto Management.
As with all Crypto encryption units, the heart of security in the Crypto Management Suite is sophisticated hardware. This security module conducts all security-relevant actions in its protected environment. Sensitive elements such as keys are randomly generated and encrypted in the security module in the process. As a result, they are protected immediately after generation for storage in the database and transmission to the encryption units.
Comprehensive centralised security management
Tamper-proof security module
True random key generation
Secure management data distribution
Management of Crypto unit parameters
This fax solution encrypts documents to the highest cryptographic standards.> More
Even in this age of the Internet, faxes are irreplaceable when it comes to sending documents in a manner which is legally binding or which preserves their legal character. The fax solution encrypts documents to the highest cryptographic standards and does so automatically in the background for the user. The transmissions can be routed via IP or via reliable analogue connections (PSTN).
High-security encryption of information being exchanged between two locations.> More
IP VPN encryption encrypts all information being exchanged between two locations over public and private networks. The tunnel mode approach is used to ensure maximum confidentiality, authenticity and integrity of the data.
IP encryption encrypts all types of communication such as e-mails, VoIP, data or video to the highest standards, thus rendering them unreadable in the network for unauthorised parties. IP VPN encryption is compatible with all IP encryption units up to a transmission rate of 1 Gbps.
Secure voice connection over fixed and mobile networks in digital or analogue mode.> More
Voice is the most original form of communication. Language consistency and speaker recognition are two central factors of voice applications, be they stationary or mobile, analogue or digital. Crypto Voice Encryption is a security solution to protect the confidentiality of your conversations without restricting your mobility or flexibility. It provides maximum security for telephony and HF radio.
Full protection for files, no matter how they are formatted.> More
Sending encrypted messages.> More