THALES - Understanding IP Encryptor Performance

This white paper takes a close look at what throughput figures really tell you, explaining the underlying limitations of the technology and quantifying the effect of encryption on network performance. The practicalities of throughput measurement are then illustrated using the Thales Datacryptor® AP (Advanced Performance) 100 Mbps IP encryptor, and guidance is given on maximising performance in a real network environment.

THALES - Building Secure Frame Relay VPN

Frame relay’s ability to mix different traffic types eliminates network duplication so that, since its introduction in the early 90s, many enterprises have taken advantage of this versatile network service. Protocols like IP, SNA and even voice traffic can be encapsulated in frame relay. However, the primary driver for migrating from leased-line private networks to frame relay networks is still cost savings.

THALES - Advanced Authentication

Advanced Authentication is a key component of any Enterprise or Internet Security system, together with Authorisation, Administration, Encryption, Intrusion Detection, Antivirus, Content Management and Firewalls. At its simplest level authentication is a way of identifying the user of a system or the sender of a message. The authentication determines that the user is who they claim to be and thus is a vital component in Identity Management systems. Identity Management systems combine processes for defining, creating, changing, deleting, authenticating, authorising and auditing users.


THALES - Certification Authorities

In days of old, introductions were made by means of credentials, issued by a trusted party. In some cases, such credentials were accepted more or less at a global level. A good example of this is the ordinary passport, supported, if necessary, by additional documentation, such as a visa. In this case, the trusted issuer of the credential is a national government or combination of governments. One obvious requirement for such credentials is that they are difficult to forge and yet easy to verify. Today, however, more and more business is conducted electronically, often via the Internet, and as face-to-face contact is reduced and documents are simply bit-strings, we have the problem of what to do about credentials. How do I prove that I am who I say I am, that my "credentials" can be trusted and that my privileges are as claimed?


News & Events

News - Mar 9, 2017

HSM User Forum 2017

Read more »

News - Aug 10, 2016

PCI-DSS Vormetric

Read more »

Product Highlight

payShield 9000

Read more »

nShield Connect+

Read more »