Crypto Mobile Client HC-7835
For travelling ambassadors, members of governments, senior civil servants, military commanders and managers, remote access via laptop/notebook to a central infrastructure and the data of their organisations is an integral part of daily work. In such cases, data exchanges can easily be tapped by unauthorized parties because they are generally conducted over an Internet access. This risk can be avoided by setting up a safe, encrypted connection (IP VPN Tunnel).
E-mails can be encrypted with the Mobile Client using a message encryption application and sent to communication partners over a regular e-mail infrastructure with end-to-end protection. Local security is provided by a protected storage unit in the HC-7835, where data can be stored transparently. The data is encrypted automatically and then decrypted when picked up or opened. Further, users go to an integrated write-protected storage unit and boot their own operating system onto their own computer. The operating system is immune to tampering and therefore free of viruses or Trojans. A file encryption application lets users encrypt sensitive data and save it on their computer or other storage media.
The IP VPN Client HC-7835 provides the perfect technical base for mobile users. Small and simple to operate, this unit can be utilised in multi-location operation with virtually any laptop or PC.
- Small, mobile unit for high-performance personal use in conducting secure data transmissions over IP networks.
- All applications, e.g. e-mail, VoIP, data or video, are protected.
- Easy to connect to notebooks or PCs (USB/Ethernet), regardless of operating system.
- Diverse possibilities for connecting to mobile networks, hotspots and satellite networks (Ethernet, WiFi, Bluetooth).
- Usable in plug-and-play operation following basic configuration.
- Also offers local security with access protection and encrypted storage.
- Encryption in tamper-proof hardware module with your own secret algorithm.
High-security encryption of information being exchanged between two locations.> More
IP VPN encryption encrypts all information being exchanged between two locations over public and private networks. The tunnel mode approach is used to ensure maximum confidentiality, authenticity and integrity of the data.
IP encryption encrypts all types of communication such as e-mails, VoIP, data or video to the highest standards, thus rendering them unreadable in the network for unauthorised parties. IP VPN encryption is compatible with all IP encryption units up to a transmission rate of 1 Gbps.
Full protection for files, no matter how they are formatted.> More
Sending encrypted messages.> More
The Security Management enables the complete administration of the encryption units including their configuration parameters.
Encrypted data and information storage systems outside your laptop for use at the office and when travelling.> More
The task of a storage area network is to store and manage large data quantities efficiently. Efficient in this case means the storage area network has to transfer data fast and expand storage capacity easily and dynamically to meet growing requirements. It has to make data available during backup and resume normal operation as quickly as possible following data restoration.