Security – EncryptionPLUS™

You take network security seriously, and so do we!

Bonded Internet’s EncryptionPLUS™ feature allows for three layers of encryption for site-to-site traffic over public connections, creating IPVPNs for customers looking for an alternative to MPLS.

Bonded Internet™ offers a number of features that ensure your security fortress remains strong. Primarily:

  1. AES and SALSA20 Tunnel Encryption for Private WANs and IPVPNs.

    Bonded Internet™ has the ability to perform standard IPVPN encryption for hub-and-spoke WANs. Customers can choose between three ciphers to encrypt traffic between the CPE device and the Aggregation server (and vice-versa).

  2. Packet Distribution across bonded connections

    By its nature, Bonded Internet™ spreads traffic across multiple Internet connections. This means that even if an attacker manages to capture one of your individual Internet connections, he will only see a small part of your entire traffic.

  3. Traffic Authentication.

    Bonded traffic is authenticated by the receiving server with a hash-based message authentication code (HMAC, from RFC2104). This prevents an attacker from modifying or forging bonded traffic between the CPE and Aggregation server.

On top of that, Bonded Internet’s security measures include:

Seamless Integration with Existing Network Architecture

Your existing network security design will not be impacted. Multapplied’s Bonded Internet™ supports all encrypted VPN traffic, and is also completely transparent to SSL traffic.

Encrypted Device Configuration Commands

Industry-standard SSL protects the appliance from unauthorized control.

Remote Bonding Appliance (CPE) Security

The bonding appliance is controlled remotely by our special configuration server. In addition to having its own firewall, all communications between the appliance and the Aggregation server are secured by SSL, ensuring that it is protected.

On the shoulders of giants

Our service uses the popular open source Linux distribution Debian. Many contributors around the world work to enhance the security of this operating system, from reviewing code to ensure security issues are eliminated before release, to implementing fixes within hours of a vulnerability becoming known. You benefit from their experience and abilities.

Secure your Internet with Bonded Internet™.

Learn more about the Applications of Encryption – Contact us today.